<

Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x

Celebrity Malware

Published on
3,301 Points
301 Views
Last Modified:
Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
A publication by Intel Security (McAfee) has highlighted the dangers of celebrity names being utilized as a tool for hackers. Pop culture is prime bait for hackers seeking to infect user’s computers and mobile devices with malicious malware. Hackers know exactly what the latest trends are online and know how to use them to their advantage.
McAfee have compiled a list of the top 10 most dangerous celebrity names online. This study highlights one of the various ways hackers benefit from people’s attraction to pop culture news.
The top 10 most dangerous names online are as follows:
How Does This Affect my Business? Screenshot_15.pngIn essence, you have a greater than 16% chance of downloading a malicious virus when downloading Amy Schumer content.
During normal working hours you would hope your employees are not doing online searches for celebrities! However, there is a good chance they will be doing this in their spare time. Employees using company laptops and phones for personal use is becoming more and more common which is slightly concerning for the business owner. Once your employee is disconnected from your Virtual Private Network they are at a greater chance of picking up malware. Viruses including zero-day malware are exactly what companies need to dodge in order to avoid complete data breach catastrophe.

What to Think About 
Our advice would be to take extra precautions and prohibit employees from using work laptops and phones for personal use altogether. If you are happy to allow your employees to use company equipment for personal use, be sure to inform them of the dangers of malware and the catastrophic consequences it can have on a business. Stress to employees to think twice before downloading audio and video files from third party sites. Advise them to download from the original source. Be extra careful when searching for ‘Torrent’ on Google as that term is considered ‘risky’ based on Intel Security’s research. Lastly, be wary of phishing emails. The latest breakthrough in pop culture news is exciting for the average online user and hackers recognize that excitement as a vulnerability. The death of Robin Williams back in 2014 was exploited by hackers with the use of social engineering tactics to reel people in with a scam email that falsely featured a video of his last words.
For more information on phishing, check out www.phishingusertraining.com.
If you are a McAfee user, you are probably well informed about McAfee End of Life. Check out our McAfee End of Life page on the main menu of TheEmailLaundry.com.
0
Comment
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
0 Comments

Featured Post

Building an interactive eFuture classroom

Watch and learn how ATEN provided a total control system solution including seamless switching matrix switch, HDBaseT extenders, PDU, lighting control to build an interactive eFuture classroom.

Join & Write a Comment

With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Next Article:

Keep in touch with Experts Exchange

Tech news and trends delivered to your inbox every month