All
All

The Twelve Scams of Christmas

139 KB | 3 files | null DOC,null PDF

Here's a list of the 12 most dangerous online scams that computer users should be cautious of this holiday season.

According to Consumer Reports' 2009 State of the Net Survey, cybercriminals have bilked $8 billion from consumers in the past two years, and McAfee warns consumers not to fall victim to the top scams this year.

As cybercriminals begin to take advantage of the holiday season, McAfee, Inc. revealed the "Twelve Scams of Christmas" — the twelve most dangerous online scams that computer users should be cautious of this holiday season.

Here is a McAfee's checklist, provided by Information Security Resources, of the top scams and a list of best practices to help users avoid them.

The attached Zip file includes:

  • Intro Page.doc
  • Cover Sheet and Terms.pdf
  • The Twelve Scams of Christmas.doc
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.

This Download is provided by:

Partner logo

Anthony M. Freed is a researcher, analyst, editor and freelance writer living in Eugene, Oregon. Anthony founded Information-Security-Resources.com in 2008, and ISR was acquired by the Infosec Island Network in January of 2010. Infosec Island is committed to serving the needs of SMBs and mid-market enterprises across many industries, including education, legal, financial, health care, government agencies and the infosec community at large.

All IT Downloads from Information Security Resources» | Visit Information Security Resources »
Related IT Downloads

Job Description: AV Technician Job Description: AV Technician

A job description for an AV Technician....  More >>

Test Plan Template Test Plan Template

This template provides a structured approach to testing for a product release or other deliverables....  More >>

SQL Injection Attacks and Defense Book Excerpt SQL Injection Attacks and Defense Book Excerpt

Get a clear understanding of this emerging tactic for hackers to gain access to your precious data....  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.