Most Dangerous Cyber Celebrities of 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Most Dangerous Cyber Celebrities of 2014-9

McAfee recently released its eighth annual study revealing the most dangerous celebrities to search for online. The study found a mix of comedians and musicians among the most dangerous, with Jimmy Kimmel, comedian and late night host of Jimmy Kimmel Live, replacing Lily Collins (Mirror, Mirror) as McAfee’s most dangerous celebrity in search. When searching for videos and downloads of Kimmel, McAfee reports that you have a 1 in 5 chance of clicking on a page that tests positive for viruses and other malware.

Jimmy Kimmel is the second male to find his way to the No. 1 spot (moving up from No. 39), following Brad Pitt in 2008. DJ Armin van Buuren takes the number-two spot behind Kimmel, and Ciara, the third. Additional celebrities in the top 10 include Blake Shelton, Britney Spears (holding her place at No.7), and three New Jersey natives: Bruce Springsteen, Jon Bon Jovi and Chelsea Handler.

Cybercriminals are constantly trying to find ways to take advantage of consumer interests, be it celebrities or other high-profile events. It's important to educate users on the security risks that exist when searching for such news and media events, in order to keep their devices and personal data safe.

Here are McAfee's most dangerous celebrities by category, as well as tips to keep users safe.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.