Most Dangerous Cyber Celebrities of 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Most Dangerous Cyber Celebrities of 2014-3 Next

Country and EDM Artists Dance to the Top

Representing popular music genres on the rise, country music stars and electric dance music (EDM) artists pump up the top 50 list. Four musicians make the top 50, with two of them landing within the top 10: Armin van Buuren (No.2) and Blake Shelton (No.6). Other musicians at play include: Calvin Harris (No. 17) and Carrie Underwood (No.47).

McAfee recently released its eighth annual study revealing the most dangerous celebrities to search for online. The study found a mix of comedians and musicians among the most dangerous, with Jimmy Kimmel, comedian and late night host of Jimmy Kimmel Live, replacing Lily Collins (Mirror, Mirror) as McAfee’s most dangerous celebrity in search. When searching for videos and downloads of Kimmel, McAfee reports that you have a 1 in 5 chance of clicking on a page that tests positive for viruses and other malware.

Jimmy Kimmel is the second male to find his way to the No. 1 spot (moving up from No. 39), following Brad Pitt in 2008. DJ Armin van Buuren takes the number-two spot behind Kimmel, and Ciara, the third. Additional celebrities in the top 10 include Blake Shelton, Britney Spears (holding her place at No.7), and three New Jersey natives: Bruce Springsteen, Jon Bon Jovi and Chelsea Handler.

Cybercriminals are constantly trying to find ways to take advantage of consumer interests, be it celebrities or other high-profile events. It's important to educate users on the security risks that exist when searching for such news and media events, in order to keep their devices and personal data safe.

Here are McAfee's most dangerous celebrities by category, as well as tips to keep users safe.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.