The Top 12 Scams of Christmas 2012: New Threats Hitting Mobile, Email and the Web

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
Previous Next

Click through for the top 12 scams for the 2012 holiday season, as identified by McAfee.

McAfee, one of the world’s largest dedicated security technology companies, recently released findings from their 2012 Holiday Shopping Study. The study, conducted online among over 2,300 U.S. adults by Harris Interactive, investigates the online habits and behaviors of Americans, including those who indicate that they will engage with the Internet and mobile devices while shopping this holiday season. In light of these findings, McAfee also exposes the Top 12 Scams of Christmas that criminals plan to use to rip off Americans as they shop online this year.

While Americans have become accustomed to shopping online, and will do so in droves, they are also using their mobile phones for more of their everyday activities.

Among those Americans planning on using smartphones and/or tablets to purchase gifts this holiday season, over half (54 percent) are specifically planning to use apps for shopping and/or banking during the holiday season; as such, mobile devices have proven irresistible to cyber criminals, and now they are targeting mobile users through malicious applications.

‘Tis the season for consumers to spend more time online - shopping for gifts. 88 percent of those Americans who plan on shopping online during the 2012 holiday season plan on using a personal computer to do so, and 34 percent will use a tablet (21 percent) and/or smartphone (19 percent). But with nearly half (48 percent) of Americans planning to shop online on Cyber Monday for sales (45 percent using a computer, 10 percent using a mobile device), here are the “12 Scams of Christmas,” the dozen most dangerous online scams to watch out for this holiday season.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.