The Latest in IT Security

Celebrity Names Used for Cyber Attacks

13
Oct
2011

Cyber attacks are one of the most concerned issues on the internet and are of great risk to privacy. These are not only risk to networks about are also threat to national interest. Cyber criminals use different methods to initiate cyber attacks, which includes use of malicious codes, breaching firewalls and hacking into accounts.

However, with internet reaching almost all corners of the world, cyber criminals are widely using malicious codes that are disturbed through websites. The code is automatically downloaded on the computer when users visit these websites – incase the user is not behind a firewall. Over the past few years cyber criminals have also adopted SEO methodologies to target large number of users.

Most Dangerous Celebrities - Heidi Klum

McAfee – an antivirus and firewall company conducted survey on celebrities names, which are most searched by users. Cyber criminals enrich websites with popular celebrity names while deploying malicious codes behind. The malicious code is downloaded on the system when user visits the website.

The company also released annual list of 10 celebrities that are most widely used by cyber criminals to attack users through SEO key wording, and Heidi Klum was at the top of the list. It was also observed during the survey that television celebrities had the highest probability of being used by cyber criminals than singers and sport persons. Infact the results also indicated that the word Heidi Klum has 10% chances to infect a system – followed by Cameron Diaz topped in 2010, and Piers Morgan.

Leave a reply


Categories

THURSDAY, MARCH 28, 2024
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments