Most Dangerous Cyber Celebrities of 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Most Dangerous Cyber Celebrities of 2014-5 Next

The Garden State

This year, four native New Jerseyians are in the top 25: Bruce Springsteen (No. 5), Bon Jovi (No. 8), Chelsea Handler (No. 9), and JWoww (No.23).

McAfee recently released its eighth annual study revealing the most dangerous celebrities to search for online. The study found a mix of comedians and musicians among the most dangerous, with Jimmy Kimmel, comedian and late night host of Jimmy Kimmel Live, replacing Lily Collins (Mirror, Mirror) as McAfee’s most dangerous celebrity in search. When searching for videos and downloads of Kimmel, McAfee reports that you have a 1 in 5 chance of clicking on a page that tests positive for viruses and other malware.

Jimmy Kimmel is the second male to find his way to the No. 1 spot (moving up from No. 39), following Brad Pitt in 2008. DJ Armin van Buuren takes the number-two spot behind Kimmel, and Ciara, the third. Additional celebrities in the top 10 include Blake Shelton, Britney Spears (holding her place at No.7), and three New Jersey natives: Bruce Springsteen, Jon Bon Jovi and Chelsea Handler.

Cybercriminals are constantly trying to find ways to take advantage of consumer interests, be it celebrities or other high-profile events. It's important to educate users on the security risks that exist when searching for such news and media events, in order to keep their devices and personal data safe.

Here are McAfee's most dangerous celebrities by category, as well as tips to keep users safe.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.