The Top 12 Scams of the Holidays 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19
Previous The Top 12 Scams of the Holidays 2014-1 Next

2014's Top Holiday Scams

Click through for the top 12 scams cyber criminals are using this holiday season, as well as tips to help keep you safe, as identified by McAfee, a part of Intel Security.

The holidays are upon us — children are making their lists, families are pulling out the holiday decorations and hanging their stockings with care, and unfortunately, cyber criminals are trying to steal your presents. McAfee, a part of Intel Security, recently released their "12 Scams of the Holidays" list to help the public protect themselves from online threats. With today's multi-device families, social media platforms and mobile access, it's even more important to take care during this busy time of year.

Holiday spending is expected to rise to over $600 billion this year, with e-commerce sales increasing from 8 to 11 percent this year to more than $105 billion. With four out of five U.S. households with Internet access conducting banking transactions online, being vigilant about safe online behavior this holiday season is more important than ever.

"As consumers shop, bank and share more while on the go, they open themselves up to threats from criminals who want to steal their personal information," said Gary Davis, chief consumer security evangelist at McAfee. "Understanding what to watch out for and how to properly secure their devices gives consumers additional information to protect their digital lives."

To help educate and protect consumers and businesses this holiday season, McAfee has identified 2014's top "12 Scams of the Holidays."


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.