McAfee, one of the world’s largest dedicated security technology companies, recently released findings from their 2012 Holiday Shopping Study. The study, conducted online among over 2,300 U.S. adults by Harris Interactive, investigates the online habits and behaviors of Americans, including those who indicate that they will engage with the Internet and mobile devices while shopping this holiday season. In light of these findings, McAfee also exposes the Top 12 Scams of Christmas that criminals plan to use to rip off Americans as they shop online this year.
While Americans have become accustomed to shopping online, and will do so in droves, they are also using their mobile phones for more of their everyday activities.
Among those Americans planning on using smartphones and/or tablets to purchase gifts this holiday season, over half (54 percent) are specifically planning to use apps for shopping and/or banking during the holiday season; as such, mobile devices have proven irresistible to cyber criminals, and now they are targeting mobile users through malicious applications.
‘Tis the season for consumers to spend more time online - shopping for gifts. 88 percent of those Americans who plan on shopping online during the 2012 holiday season plan on using a personal computer to do so, and 34 percent will use a tablet (21 percent) and/or smartphone (19 percent). But with nearly half (48 percent) of Americans planning to shop online on Cyber Monday for sales (45 percent using a computer, 10 percent using a mobile device), here are the “12 Scams of Christmas,” the dozen most dangerous online scams to watch out for this holiday season.
Motivations behind the attacks ranged by industry and, predictably, not a single sector was left untouched by the unscrupulous actors. ... More >>
Due to a variety of natural and manmade disasters – including cyber attacks – organizations are placing greater emphasis on DR initiatives. ... More >>
Data breach risks are pervasive across the organization, not just with unhappy employees, and particular attention needs to be paid to those who have access to the most sensitive information. ... More >>