The Top 12 Scams of the Holidays 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19
Next The Top 12 Scams of the Holidays 2014-15 Next

Safety Tip: Analyze Apps

Before downloading a new app, review it to make sure you know exactly what you're putting on your smartphone.

  • Only download apps from an official app store and not a third party.
  • If the app requests too many permissions, do not download it. It may be requesting access to information on your phone that you would prefer to keep private, and certainly more information than it needs.
  • Use antivirus software and learn more about FakeInstallers.

The holidays are upon us — children are making their lists, families are pulling out the holiday decorations and hanging their stockings with care, and unfortunately, cyber criminals are trying to steal your presents. McAfee, a part of Intel Security, recently released their "12 Scams of the Holidays" list to help the public protect themselves from online threats. With today's multi-device families, social media platforms and mobile access, it's even more important to take care during this busy time of year.

Holiday spending is expected to rise to over $600 billion this year, with e-commerce sales increasing from 8 to 11 percent this year to more than $105 billion. With four out of five U.S. households with Internet access conducting banking transactions online, being vigilant about safe online behavior this holiday season is more important than ever.

"As consumers shop, bank and share more while on the go, they open themselves up to threats from criminals who want to steal their personal information," said Gary Davis, chief consumer security evangelist at McAfee. "Understanding what to watch out for and how to properly secure their devices gives consumers additional information to protect their digital lives."

To help educate and protect consumers and businesses this holiday season, McAfee has identified 2014's top "12 Scams of the Holidays."

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.