2012’s Most Dangerous Cyber Celebrities

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  16
Previous Next

Click through for tips on keeping users safe while searching and the top 10 most dangerous celebrities online, as identified by McAfee.

Topics : Transport Layer Security, Encryption, SEO, Switches

Emma Watson has replaced Heidi Klum as McAfee's 2012 most dangerous celebrity to search for online. For the sixth year in a row, McAfee researched popular culture’s most famous people to reveal the riskiest Hollywood actors, athletes, musicians, politicians, designers, and comedians on the Web. The McAfee Most Dangerous Celebrities™ study found that women are more dangerous than men, with Jessica Biel taking the number two spot and Eva Mendes coming in third. Latina women have proven that they are on fire and make up five of the top ten spots. After Mendes, Selena Gomez, Shakira and Salma Hayek take the fourth, seventh and ninth spot and Sofia Vergara rounds out the top 10 list. Funnyman Jimmy Kimmel is the only male to make the top 20 list this year.


Cyber criminals follow the latest trends, often using the names of popular celebrities to lure people to sites that are actually laden with malicious software that are designed to steal passwords and personal information. Anyone looking for the latest videos or files to download could end up with a malware-ridden computer along with the trendy content. This year, searching for a celebrity name with “free downloads” and “nude pictures” as part of the search term resulted in the highest result of risky sites.

“In today’s celebrity culture, consumers expect to be able to go online to catch up with the latest photos, videos, tweets, and stories about their favorite celebrities. Due to the richness of the data and the high interaction, often times consumers forget the risks that they are taking by clicking on the links,” said Paula Greve, director of web security research at McAfee. “As the sophistication and expectations of consumers with respect to their online experience has increased, so has the level and ability to deliver malware either by malvertising, exploiting the user’s browser without their awareness, or masking malicious URLs behind shortened URLs.”

 

More Slideshows

Lumension10QsSecurityVendors0x 2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors

In the spirit of 2015 planning, now is the time of year when IT teams start to tackle big, complicated issues like endpoint and mobile security. ...  More >>

Security41-190x128 Cybersecurity Grades Released for Key Industries

Looking at cyber data through a business intelligence lens ensures that security-related trends and potential impacts to organizations can be understood and effectively addressed. ...  More >>

Security39-290x195 Five Critical Steps for Handling a Security Breach

No one can stop all security breaches, but you can take steps to dramatically improve your ability to avoid disaster and mitigate damage. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.