The Top 12 Scams of the Holidays 2014

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19
Next The Top 12 Scams of the Holidays 2014-4 Next

Chilling Charities

'Tis the season for giving. During the holidays, many consumers give back by donating to their favorite charity. Sadly, no good deed goes unpunished. Be wary of fake charities that could reach you via email, or are shared virally through social media.

The holidays are upon us — children are making their lists, families are pulling out the holiday decorations and hanging their stockings with care, and unfortunately, cyber criminals are trying to steal your presents. McAfee, a part of Intel Security, recently released their "12 Scams of the Holidays" list to help the public protect themselves from online threats. With today's multi-device families, social media platforms and mobile access, it's even more important to take care during this busy time of year.

Holiday spending is expected to rise to over $600 billion this year, with e-commerce sales increasing from 8 to 11 percent this year to more than $105 billion. With four out of five U.S. households with Internet access conducting banking transactions online, being vigilant about safe online behavior this holiday season is more important than ever.

"As consumers shop, bank and share more while on the go, they open themselves up to threats from criminals who want to steal their personal information," said Gary Davis, chief consumer security evangelist at McAfee. "Understanding what to watch out for and how to properly secure their devices gives consumers additional information to protect their digital lives."

To help educate and protect consumers and businesses this holiday season, McAfee has identified 2014's top "12 Scams of the Holidays."

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.