McAfee, one of the world’s largest dedicated security technology companies, recently released findings from their 2012 Holiday Shopping Study. The study, conducted online among over 2,300 U.S. adults by Harris Interactive, investigates the online habits and behaviors of Americans, including those who indicate that they will engage with the Internet and mobile devices while shopping this holiday season. In light of these findings, McAfee also exposes the Top 12 Scams of Christmas that criminals plan to use to rip off Americans as they shop online this year.
While Americans have become accustomed to shopping online, and will do so in droves, they are also using their mobile phones for more of their everyday activities.
Among those Americans planning on using smartphones and/or tablets to purchase gifts this holiday season, over half (54 percent) are specifically planning to use apps for shopping and/or banking during the holiday season; as such, mobile devices have proven irresistible to cyber criminals, and now they are targeting mobile users through malicious applications.
‘Tis the season for consumers to spend more time online - shopping for gifts. 88 percent of those Americans who plan on shopping online during the 2012 holiday season plan on using a personal computer to do so, and 34 percent will use a tablet (21 percent) and/or smartphone (19 percent). But with nearly half (48 percent) of Americans planning to shop online on Cyber Monday for sales (45 percent using a computer, 10 percent using a mobile device), here are the “12 Scams of Christmas,” the dozen most dangerous online scams to watch out for this holiday season.
With the holiday shopping season upon us, the FBI is warning consumers to be on the lookout for cyber scams and phishing attacks. ... More >>
So what is on the horizon for 2016? Most experts expect to see continued growth in mobile malware and even more security breaches, especially in the health care and financial industries. ... More >>
The new age of security technology will focus on solutions that speed up, automate and ideally combine phases of the typical security process. ... More >>