The 12 Scams of Christmas 2013

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14
Previous Next

Click through for 2013's top 12 scams of Christmas, as identified by McAfee.

McAfee recently released its annual “12 Scams of Christmas” list to educate the public on the most common scams that criminals use during the holiday season to take advantage of consumers as they shop on their digital devices. Cyber criminals leverage these scams to steal personal information, earn fast cash, and spread malware.

This year, fall holiday shopping sales are expected to soar to an estimated $602 billion. E-commerce sales are predicted to rise 15 percent compared to last year’s digital sales to more than $60 billion, with m-commerce comprising 16 percent of this number. Consumers should ensure that they are taking all precautions to protect the data saved on their devices. This is especially true for the 51 percent of U.S. adults that bank online and 32 percent that use mobile banking.

“The potential for identity theft increases as consumers share personal information across multiple devices that are often under protected,” said Michelle Dennedy, vice president and chief privacy officer at McAfee. “Understanding criminals’ mindsets and being aware of how they try to take advantage of consumers can help ensure that we use our devices the way they were intended – to enhance our lives, not jeopardize them.”

To help consumers stay alert for greedy Grinches as they surf the Web for holiday travel deals and seek out gifts for their loved ones, McAfee has identified this year’s top “12 Scams of Christmas.”

 

Related Topics : In Their Own Words: The Four Dark Horses for the Third Major Mobile OS Speak, HTC, Mobile Search, 3G, Location-Based Services

 
More Slideshows

Mays2015WearableTech0x 2015 Wearable Tech Trends: Swank Meets Science

Tech companies and fashion designers both seem to agree that the wearables of tomorrow will likely be fashion that incorporates technology instead of the other way around. ...  More >>

Bluebox2015MobileSecurity190 Mobile Security 2015: The Enterprise at Risk

While hackers have many points of entry – point-of-sale devices, phishing emails, malware, etc. - the long reach of mobile to mission-critical apps and data has exponentially increased the potential for a breach. ...  More >>

Android2014BestApps0x The Eighteen Best Android Apps of 2014

With the end of the year fast approaching, the staff at Google Play has made their picks for the best Android apps of 2014. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date