Online Celebrity Searches that Could Land You in Hot Water

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Online Celebrity Searches that Could Land You in Hot Water-7

Wanting to know the latest dish on your favorite celebrity can be a pretty big lure. Do a quick search and -- boom -- tons of links with the latest news, gossip and goings on. Unfortunately, cyber criminals are well aware of our love for all things celebrity and are more than happy to set up malicious sites that will further their cause, whether it is to spread malware or find an access point to an otherwise well-secured enterprise network.

Intel Security recently released its list of the top 10 most dangerous cyber celebrities for 2015. This year, electronic dance music (EDM) DJ Armin Van Buuren replaced Jimmy Kimmel as the no. 1 most dangerous online celebrity. Their research found that clicking on results generated by searching for “Armin van Buuren” combined with the terms "free MP4,” “HD downloads,” or “torrent” yields almost a 1 in 5 chance of landing on a website that has tested positive for online threats, such as spyware, adware, spam, phishing, viruses and other malware.

To protect critical business assets, it's important to educate users about the dangers of online searches, especially for celebrities, and provide them with tips on how to better protect themselves and the company. In this slideshow, we've featured Intel Security's 10 most dangerous celebrities as well as tips on how users can better protect themselves.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.