2012’s Most Dangerous Cyber Celebrities

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  16
Previous Next

Click through for tips on keeping users safe while searching and the top 10 most dangerous celebrities online, as identified by McAfee.

Topics : Transport Layer Security, Encryption, SEO, Switches

Emma Watson has replaced Heidi Klum as McAfee's 2012 most dangerous celebrity to search for online. For the sixth year in a row, McAfee researched popular culture’s most famous people to reveal the riskiest Hollywood actors, athletes, musicians, politicians, designers, and comedians on the Web. The McAfee Most Dangerous Celebrities™ study found that women are more dangerous than men, with Jessica Biel taking the number two spot and Eva Mendes coming in third. Latina women have proven that they are on fire and make up five of the top ten spots. After Mendes, Selena Gomez, Shakira and Salma Hayek take the fourth, seventh and ninth spot and Sofia Vergara rounds out the top 10 list. Funnyman Jimmy Kimmel is the only male to make the top 20 list this year.


Cyber criminals follow the latest trends, often using the names of popular celebrities to lure people to sites that are actually laden with malicious software that are designed to steal passwords and personal information. Anyone looking for the latest videos or files to download could end up with a malware-ridden computer along with the trendy content. This year, searching for a celebrity name with “free downloads” and “nude pictures” as part of the search term resulted in the highest result of risky sites.

“In today’s celebrity culture, consumers expect to be able to go online to catch up with the latest photos, videos, tweets, and stories about their favorite celebrities. Due to the richness of the data and the high interaction, often times consumers forget the risks that they are taking by clicking on the links,” said Paula Greve, director of web security research at McAfee. “As the sophistication and expectations of consumers with respect to their online experience has increased, so has the level and ability to deliver malware either by malvertising, exploiting the user’s browser without their awareness, or masking malicious URLs behind shortened URLs.”

 

More Slideshows

Security39-290x195 Five Critical Steps for Handling a Security Breach

No one can stop all security breaches, but you can take steps to dramatically improve your ability to avoid disaster and mitigate damage. ...  More >>

AccellionPrevenDataBreach0x How to Prevent Data from Being Breached

Eight ways companies can guard their intellectual property, personnel files and sales contracts from being leaked into the digital atmosphere. ...  More >>

Security31-290x195 Top Five Trends in Network Forensics Adoption

Study finds organizations are severely limiting their ability to properly monitor and troubleshoot their networks due to a lack of network forensics solutions. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.