Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
A publication by Intel Security
) has highlighted the dangers of celebrity names being utilized as a tool for hackers. Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
McAfee have compiled a list of the top 10 most dangerous celebrity names online. This study highlights one of the various ways hackers benefit from people’s attraction to pop culture news.
The top 10 most dangerous names online are as follows:
How Does This Affect my Business?
In essence, you have a greater than 16% chance of downloading a malicious virus when downloading Amy Schumer
During normal working hours you would hope your employees are not doing online searches for celebrities! However, there is a good chance they will be doing this in their spare time. Employees using company laptops and phones for personal use is becoming more and more common which is slightly concerning for the business owner. Once your employee is disconnected from your Virtual Private Network
they are at a greater chance of picking up malware. Viruses including zero-day malware
are exactly what companies need to dodge in order to avoid complete data breach
What to Think About
Our advice would be to take extra precautions and prohibit employees from using work laptops and phones for personal use altogether. If you are happy to allow your employees to use company equipment for personal use, be sure to inform them of the dangers of malware
and the catastrophic consequences
it can have on a business. Stress to employees to think twice before downloading audio and video files from third party sites. Advise them to download from the original source. Be extra careful when searching for ‘Torrent’ on Google
as that term is considered ‘risky’ based on Intel Security’s research. Lastly, be wary of phishing emails
. The latest breakthrough in pop culture news is exciting for the average online user and hackers recognize that excitement as a vulnerability. The death of Robin Williams
back in 2014 was exploited by hackers with the use of social engineering tactics to reel people in with a scam email that falsely featured a video of his last words.
For more information on phishing, check out www.phishingusertraining.com
If you are a McAfee user, you are probably well informed about McAfee End of Life. Check out our McAfee End of Life page on the main menu of TheEmailLaundry.com