The Top 12 Scams of the Holidays 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19
Next The Top 12 Scams of the Holidays 2014-14 Next

Safety Tip: Do Your Research

Whether online shopping, donating to charities, or tracking your gifts, do your research to make sure the company you are working with is legitimate.

  • Do an online search of the company you're buying items from to see if there's any news about recent risks.
  • Go to the company's homepage to make sure it is a genuine business.
  • Instead of clicking on a link in an email for a shopping deal, visit the site directly.

The holidays are upon us — children are making their lists, families are pulling out the holiday decorations and hanging their stockings with care, and unfortunately, cyber criminals are trying to steal your presents. McAfee, a part of Intel Security, recently released their "12 Scams of the Holidays" list to help the public protect themselves from online threats. With today's multi-device families, social media platforms and mobile access, it's even more important to take care during this busy time of year.

Holiday spending is expected to rise to over $600 billion this year, with e-commerce sales increasing from 8 to 11 percent this year to more than $105 billion. With four out of five U.S. households with Internet access conducting banking transactions online, being vigilant about safe online behavior this holiday season is more important than ever.

"As consumers shop, bank and share more while on the go, they open themselves up to threats from criminals who want to steal their personal information," said Gary Davis, chief consumer security evangelist at McAfee. "Understanding what to watch out for and how to properly secure their devices gives consumers additional information to protect their digital lives."

To help educate and protect consumers and businesses this holiday season, McAfee has identified 2014's top "12 Scams of the Holidays."


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.