Online Celebrity Searches that Could Land You in Hot Water

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Next

Mad for Movies

Though no movie stars made the top 10 this year, several can be “scene” in the top 30, including: Antonio Banderas (No. 14), Nicole Kidman (No. 15), Zac Efron (No. 17), Natalie Portman (No. 18), Sandra Bullock (No. 19), Jennifer Lawrence (No. 20), Kate Mara (No. 22), Penelope Cruz (No. 27), Rooney Mara (No. 28), Scarlett Johansson, Jessica Alba, and Naomi Watts (tied at No. 29).

Wanting to know the latest dish on your favorite celebrity can be a pretty big lure. Do a quick search and -- boom -- tons of links with the latest news, gossip and goings on. Unfortunately, cyber criminals are well aware of our love for all things celebrity and are more than happy to set up malicious sites that will further their cause, whether it is to spread malware or find an access point to an otherwise well-secured enterprise network.

Intel Security recently released its list of the top 10 most dangerous cyber celebrities for 2015. This year, electronic dance music (EDM) DJ Armin Van Buuren replaced Jimmy Kimmel as the no. 1 most dangerous online celebrity. Their research found that clicking on results generated by searching for “Armin van Buuren” combined with the terms "free MP4,” “HD downloads,” or “torrent” yields almost a 1 in 5 chance of landing on a website that has tested positive for online threats, such as spyware, adware, spam, phishing, viruses and other malware.

To protect critical business assets, it's important to educate users about the dangers of online searches, especially for celebrities, and provide them with tips on how to better protect themselves and the company. In this slideshow, we've featured Intel Security's 10 most dangerous celebrities as well as tips on how users can better protect themselves.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.