The Top 12 Scams of the Holidays 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19
Next The Top 12 Scams of the Holidays 2014-8 Next

Holiday Travel Scams

With travel on the rise during peak holiday times, online scammers are ready to take advantage of the fact that consumers often become less vigilant about their safety. Fake online travel deal links are bountiful, but risks also exist once you arrive at your destination, including spyware that can access your information through logging onto infected PCs onsite.

The holidays are upon us — children are making their lists, families are pulling out the holiday decorations and hanging their stockings with care, and unfortunately, cyber criminals are trying to steal your presents. McAfee, a part of Intel Security, recently released their "12 Scams of the Holidays" list to help the public protect themselves from online threats. With today's multi-device families, social media platforms and mobile access, it's even more important to take care during this busy time of year.

Holiday spending is expected to rise to over $600 billion this year, with e-commerce sales increasing from 8 to 11 percent this year to more than $105 billion. With four out of five U.S. households with Internet access conducting banking transactions online, being vigilant about safe online behavior this holiday season is more important than ever.

"As consumers shop, bank and share more while on the go, they open themselves up to threats from criminals who want to steal their personal information," said Gary Davis, chief consumer security evangelist at McAfee. "Understanding what to watch out for and how to properly secure their devices gives consumers additional information to protect their digital lives."

To help educate and protect consumers and businesses this holiday season, McAfee has identified 2014's top "12 Scams of the Holidays."


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.