Celebrity Searches and Internet Security

WebWhat do celebrities have to do with Internet security? If you follow the happenings of any of these celebrities on the Internet; well…let’s just say you’d better be careful what you search for:

  1. Cameron Diaz
  2. Julia Roberts
  3. Jessica Biel
  4. Gisele Bundchen
  5. Brad Pitt
  6. Adriana Lima
  7. Jennifer Love Hewitt, Nicole Kidman
  8. Tom Cruise
  9. Heidi Klum, Penelope Cruz
  10. Anna Paquin

Why? One of the techniques used by cyber criminals to lure Internet users to malicious sites is to create fake celebrity websites and emails pretending to have news, photos, and other information about the most popular celebs. The crooks are very successful using this technique. Here’s how it works: an Internet user (fan) accesses the fake celebrity website or email; then a malware payload (read: nasty virus or worse) is placed on the Internet user’s computer. I think you know that things go downhill from there. This technique is also used with major news events around the world like earthquakes, hurricanes, wars, etc.

Internet security company McAfee recently reported a list of the top 10 celebrity searches that can lead to an infection of your computer. Check it out and heed it’s warning.

Let me know your opinion on this issue by commenting on this article; we all learn from each other when our views and opinions are shared.

If you don’t want to miss an article, enter your email address in the Email Subscriptions box on the right side of the page, and I’ll send you an email when a new article is posted.  I don’t share your email address with anyone…not anyone; I hate spam too.  Please share my site with your friends and family.  Thanks.

Remember, home computing is a blast…keep it productive and enjoyable.

Best regards,





Filed under Internet, security

3 responses to “Celebrity Searches and Internet Security

  1. Pingback: Geek Squeaks’ of the Week (#76) « What's On My PC

  2. Pingback: Tweets that mention Celebrity Searches and Internet Security | Paul's Home Computing Blog -- Topsy.com

What do you think?

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s