Emma Watson has replaced Heidi Klum as McAfee's 2012 most dangerous celebrity to search for online. For the sixth year in a row, McAfee researched popular culture’s most famous people to reveal the riskiest Hollywood actors, athletes, musicians, politicians, designers, and comedians on the Web. The McAfee Most Dangerous Celebrities™ study found that women are more dangerous than men, with Jessica Biel taking the number two spot and Eva Mendes coming in third. Latina women have proven that they are on fire and make up five of the top ten spots. After Mendes, Selena Gomez, Shakira and Salma Hayek take the fourth, seventh and ninth spot and Sofia Vergara rounds out the top 10 list. Funnyman Jimmy Kimmel is the only male to make the top 20 list this year.
Cyber criminals follow the latest trends, often using the names of popular celebrities to lure people to sites that are actually laden with malicious software that are designed to steal passwords and personal information. Anyone looking for the latest videos or files to download could end up with a malware-ridden computer along with the trendy content. This year, searching for a celebrity name with “free downloads” and “nude pictures” as part of the search term resulted in the highest result of risky sites.
“In today’s celebrity culture, consumers expect to be able to go online to catch up with the latest photos, videos, tweets, and stories about their favorite celebrities. Due to the richness of the data and the high interaction, often times consumers forget the risks that they are taking by clicking on the links,” said Paula Greve, director of web security research at McAfee. “As the sophistication and expectations of consumers with respect to their online experience has increased, so has the level and ability to deliver malware either by malvertising, exploiting the user’s browser without their awareness, or masking malicious URLs behind shortened URLs.”
These facts aren't for the faint of heart, so leave a light on while you learn about the dangers faced by data in the wild. ... More >>
Here are five steps organizations and individual users should take now to protect their most sensitive password-protected information. ... More >>
In the spirit of 2015 planning, now is the time of year when IT teams start to tackle big, complicated issues like endpoint and mobile security. ... More >>