{"id":81481,"date":"2016-10-15T13:56:44","date_gmt":"2016-10-15T17:56:44","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2022-08-12T15:33:16","modified_gmt":"2022-08-12T19:33:16","slug":"2016s-most-dangerous-online-celebrities","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/2016s-most-dangerous-online-celebrities\/","title":{"rendered":"2016&#8217;s Most Dangerous Online Celebrities"},"content":{"rendered":"<p><a href=\"https:\/\/marjanrepic.wordpress.com\/2011\/11\/19\/computer-virus\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-101246\" title=\"2016's Most Dangerous Online Celebrities\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-6.jpg?resize=110%2C110&#038;ssl=1\" alt=\"2016's Most Dangerous Online Celebrities\" width=\"110\" height=\"110\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-6.jpg?w=116&amp;ssl=1 116w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-6.jpg?resize=75%2C75&amp;ssl=1 75w\" sizes=\"auto, (max-width: 110px) 100vw, 110px\" \/><\/a>The 10th annual <a href=\"https:\/\/web.archive.org\/web\/20221127195906\/https:\/\/newsroom.intel.com\/news-releases\/mcafee-2016-most-dangerous-celebrities\/\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee Top 100 Most Dangerous Celebrities to Search for Online Study<\/a>, published by <a href=\"https:\/\/www.nytimes.com\/2016\/09\/08\/business\/dealbook\/intel-sells-a-majority-stake-of-cybersecurity-unit-mcafee-to-tpg.html\" target=\"_blank\" rel=\"noopener noreferrer\">Intel Security<\/a>, was recently released.\u00a0 The yearly report uncovers which <strong>celebrities are the most dangerous to search for on Intertube<\/strong>.\u00a0 These dangerous celeb results can expose fans to viruses, malware, and identity theft while searching for the latest information on today&#8217;s pop culture stars.\u00a0 Intel\u00a0(<a title=\"HASDAQ : INTC\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-INTC\/\" target=\"_blank\" rel=\"noopener noreferrer\">INTC<\/a>) used its McAfee site rating software to find the number of risky sites generated by searches on <a href=\"http:\/\/www.google.com\" target=\"_blank\" rel=\"noopener noreferrer\">Google<\/a>, <a href=\"http:\/\/www.bing.com\" target=\"_blank\" rel=\"noopener noreferrer\">Bing<\/a>, and <a href=\"http:\/\/www.vanityfair.com\/news\/2016\/10\/verizon-is-having-second-thoughts-about-buying-yahoo\" target=\"_blank\" rel=\"noopener noreferrer\">even<\/a> <a href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2016\/09\/28\/could-yahoo-be-in-trouble-with-the-sec\/\" target=\"_blank\" rel=\"noopener noreferrer\">beleaguered<\/a> <a href=\"http:\/\/www.yahoo.com\" target=\"_blank\" rel=\"noopener noreferrer\">Yahoo<\/a>.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20210929022240\/https:\/\/itpeernetwork.intel.com\/rise-of-intel-security\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101247\" title=\"Intel security\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/intel-mcafee-1.jpg?resize=119%2C90&#038;ssl=1\" alt=\"Intel security\" width=\"119\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/intel-mcafee-1.jpg?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/intel-mcafee-1.jpg?resize=75%2C56&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/intel-mcafee-1.jpg?w=652&amp;ssl=1 652w\" sizes=\"auto, (max-width: 119px) 100vw, 119px\" \/><\/a>&#8220;<em>Consumers today remain fascinated with celebrity culture and go online to find the latest <strong>pop culture<\/strong> news,<\/em>&#8221; said <a href=\"https:\/\/www.crunchbase.com\/person\/gary-davis-5#\/entity\" target=\"_blank\" rel=\"noopener noreferrer\">Gary Davis<\/a>, chief consumer security evangelist at Intel Security.\u00a0 &#8220;<em>With this craving for real-time information, many <strong>search and click without considering potential security risks<\/strong>.\u00a0 Cyber-criminals know this and take advantage of this behavior by attempting to lead them to unsafe sites loaded with malware.<\/em>&#8221;<\/p>\n<h3>Most Dangerous Online Celebrities<\/h3>\n<p>This year&#8217;s most dangerous celebrity online is <strong><a title=\"Amy Schumer\" href=\"http:\/\/en.wikipedia.org\/wiki\/Amy_Schumer\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">Amy Schumer<\/a><\/strong>.\u00a0 The comic joins recent most dangerous celebrity online alumni <a href=\"https:\/\/wp.me\/p2wgaW-iUX\" target=\"_blank\" rel=\"noopener noreferrer\">Jimmy Kimmel<\/a>, <a href=\"https:\/\/wp.me\/p2wgaW-2hz\" target=\"_blank\" rel=\"noopener noreferrer\">Jay Leno<\/a>, and <a href=\"https:\/\/wp.me\/p2wgaW-58Q\" target=\"_blank\" rel=\"noopener noreferrer\">Emma Watson<\/a>.\u00a0 According to Intel Security, a search for the &#8220;<a href=\"http:\/\/www.imdb.com\/title\/tt3152624\/\" target=\"_blank\" rel=\"noopener noreferrer\">Trainwreck<\/a>&#8221; actress has a 16.1% likelihood of returning results that <strong>direct fans to sites with viruses and malware<\/strong>.<\/p>\n<p><a href=\"https:\/\/www.topsinlex.com\/Read\/8347\/Comedian+Amy+Schumer+Announces+New+Spring+Tour+Dates!+\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101251 \" title=\"2016 most dangerous celebrity online is Amy Schumer\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/amy-schumer.jpg?resize=143%2C100&#038;ssl=1\" alt=\"2016 most dangerous celebrity online is Amy Schumer\" width=\"143\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/amy-schumer.jpg?resize=150%2C105&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/amy-schumer.jpg?resize=75%2C52&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/amy-schumer.jpg?w=715&amp;ssl=1 715w\" sizes=\"auto, (max-width: 143px) 100vw, 143px\" \/><\/a><strong>Justin Biber<\/strong> is the second most dangerous online celebrity.\u00a0 As for the &#8220;Sorry&#8221; singer, there&#8217;s a 15% chance that Beliebers could connect with a malicious website.<\/p>\n<p>The rest of this year&#8217;s Top 10 list included:<br \/>\n3.\u00a0 <a title=\"Carson Daly\" href=\"https:\/\/web.archive.org\/web\/20110721234427\/http:\/\/www.nbc.com:80\/Last_Call_with_Carson_Daly\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">Carson Daly<\/a> 13.4%<br \/>\n4.\u00a0 <a href=\"http:\/\/www.imdb.com\/name\/nm0000226\/\" target=\"_blank\" rel=\"noopener noreferrer\">Will Smith<\/a> 13.4%<br \/>\n5.\u00a0 <a href=\"https:\/\/en.wikipedia.org\/wiki\/Rihanna\" target=\"_blank\" rel=\"noopener noreferrer\">Rihanna<\/a> 13.3%<br \/>\n6.\u00a0 <a title=\"Miley Cyrus\" href=\"http:\/\/en.wikipedia.org\/wiki\/Miley_Cyrus\" target=\"_blank\" rel=\"wikipedia nofollow noopener noreferrer\">Miley Cyrus <\/a>12.7%<br \/>\n7.\u00a0 <a href=\"https:\/\/web.archive.org\/web\/20170910231221\/http:\/\/nerdist.com\/tag\/chris-hardwick\/\" target=\"_blank\" rel=\"noopener noreferrer\">Chis Hardwick<\/a> 12.6%<br \/>\n8.\u00a0 <a title=\"Daniel Tosh\" href=\"http:\/\/www.danieltosh.com\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">Daniel Tosh\u00a0 <\/a>11.6%<br \/>\n9.\u00a0 <a href=\"https:\/\/www.imdb.com\/name\/nm1411125\/\" target=\"_blank\" rel=\"noopener noreferrer\">Selena Gomez<\/a> 11.1%<br \/>\n10.\u00a0 <a href=\"https:\/\/en.wikipedia.org\/wiki\/Kesha\" target=\"_blank\" rel=\"noopener noreferrer\">Kesha<\/a> 1<a href=\"https:\/\/web.archive.org\/web\/20231231154448\/https:\/\/www.lifehacker.com.au\/2015\/11\/we-talked-to-an-ethical-hacker-heres-what-we-learned\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101257 \" title=\"exploit celebrity fandom for abuse\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers17-e1566429531466-150x114.jpg?resize=119%2C90&#038;ssl=1\" alt=\"exploit celebrity fandom for abuse\" width=\"119\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers17-e1566429531466.jpg?resize=150%2C114&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers17-e1566429531466.jpg?resize=75%2C57&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers17-e1566429531466.jpg?resize=768%2C583&amp;ssl=1 768w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/hackers17-e1566429531466.jpg?w=777&amp;ssl=1 777w\" sizes=\"auto, (max-width: 119px) 100vw, 119px\" \/><\/a>1.1%<\/p>\n<p>Intel says there are two big truths: cyber-criminals try to exploit <strong>celebrity fandom for abuse<\/strong>.\u00a0 The first is that consumers want convenience.\u00a0 As people rely less on cable and, instead, search for the content they want online, they&#8217;ll find many<strong> third-party sources for their favorite music or videos<\/strong>.<\/p>\n<p>But unofficial sources are often dangerous.\u00a0 Links can send users to unsafe sites, where sneaky tactics for stealing data and usernames are awaiting.\u00a0 The popular torrent file format for downloading files allows <strong>cyber-criminals to sneak viruses onto devices<\/strong>.<\/p>\n<h3><a href=\"https:\/\/web.archive.org\/web\/20220705033714\/https:\/\/bestcellphonespyapps.com\/cell-phone-spy-free-preventing-gossiping-workplace\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101260 \" title=\"social media obsessed culture\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/gossiping.jpg?resize=100%2C100&#038;ssl=1\" alt=\"social media obsessed culture\" width=\"100\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/gossiping.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/gossiping.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/gossiping.jpg?w=500&amp;ssl=1 500w\" sizes=\"auto, (max-width: 100px) 100vw, 100px\" \/><\/a>Social media-obsessed culture<\/h3>\n<p>The second truth attackers are exploiting is the desire for gossip \u2013 now.\u00a0 In today&#8217;s <strong>social media-obsessed culture<\/strong>, fans want real-time information about their favorite celebrities.\u00a0 It isn&#8217;t uncommon for a celebrity to share a photo, post, or comment around the world in a matter of seconds.\u00a0 Those posts often spark a wave of searches.\u00a0 With all that traffic, cyber-criminals can trick fans into visiting a faux-gossip <strong>website infested with malware to steal passwords, credit card information, and more<\/strong>.\u00a0 This method is particularly effective on social media channels, like <a title=\"Facebook\" href=\"https:\/\/www.facebook.com\/\" target=\"_blank\" rel=\"nofollow noopener ugc\">Facebook<\/a>, <a href=\"http:\/\/www.twitter.com\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>, and <a href=\"https:\/\/www.whatsapp.com\" target=\"_blank\" rel=\"noopener noreferrer\">WhatsApp<\/a>, where the standards for trust are low.<\/p>\n<h3>How to protect yourself<\/h3>\n<p>In addition to recommending anti-virus software, Intel, whose products include McAfee software, urges consumers to be skeptical when surfing the web.\u00a0 But don&#8217;t worry.\u00a0 No one is asking you to give up your celebrity infatuation; here are a few things you can do to make sure you&#8217;re entertained safely:<\/p>\n<ul>\n<li><strong><a href=\"https:\/\/web.archive.org\/web\/20160625024228\/http:\/\/www.grandparents.com:80\/food-and-leisure\/technology\/best-streaming-service\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101262 \" title=\"rusted video streaming services\u00a0\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sttreaming-service-e1566429651639-150x106.jpg?resize=140%2C99&#038;ssl=1\" alt=\"rusted video streaming services\u00a0\" width=\"140\" height=\"99\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sttreaming-service-e1566429651639.jpg?resize=150%2C106&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sttreaming-service-e1566429651639.jpg?resize=75%2C53&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/sttreaming-service-e1566429651639.jpg?w=462&amp;ssl=1 462w\" sizes=\"auto, (max-width: 140px) 100vw, 140px\" \/><\/a>Watch media from sources.\u00a0 <\/strong>Are you looking for the latest episode of Amy Schumer&#8217;s TV show, <a title=\"Inside Amy Schumer\" href=\"https:\/\/web.archive.org\/web\/20140308192844\/http:\/\/www.comedycentral.com\/shows\/inside-amy-schumer\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">Inside Amy Schumer<\/a>?\u00a0 Stick to the official source at <a href=\"http:\/\/www.cc.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">comedycentral.com<\/a> or well-known and trusted video streaming services\u00a0like <a href=\"http:\/\/www.hulu.com\" target=\"_blank\" rel=\"noopener noreferrer\">Hulu<\/a> to ensure you aren&#8217;t clicking on anything malicious.<\/li>\n<li><strong>Be wary of searching for file downloads<\/strong>.\u00a0 Of all the celebrity-related searches we conducted, &#8220;<a href=\"http:\/\/www.ghacks.net\/2012\/08\/05\/so-what-is-a-torrent-exactly\/\" target=\"_blank\" rel=\"noopener noreferrer\">torrent<\/a>&#8221; was the riskiest by far.\u00a0 According to Intel, a search for &#8216;Amy Schumer Torrent&#8217; results in a 33 % chance of connecting to a malicious website.\u00a0 Cybercriminals can use torrents to embed malware within authentic files, making it tricky to detect safe downloads from unsafe sources.\u00a0 It&#8217;s best to avoid using torrents, especially when so many legitimate streaming options are available.<\/li>\n<li><strong><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-101264 \" title=\"Keep your personal information personal.\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/file_cabinet.gif?resize=74%2C129&#038;ssl=1\" alt=\"Keep your personal information personal.\" width=\"74\" height=\"129\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/file_cabinet.gif?resize=86%2C150&amp;ssl=1 86w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/file_cabinet.gif?resize=43%2C75&amp;ssl=1 43w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/file_cabinet.gif?resize=588%2C1024&amp;ssl=1 588w\" sizes=\"auto, (max-width: 74px) 100vw, 74px\" \/>Keep your personal information private<\/strong>.\u00a0 Cybercriminals are always looking for ways to steal your personal information.\u00a0 If you receive a request to enter information like your credit card, email, home address, or social media log-in, Intel says you should not give it out thoughtlessly.\u00a0 Please research and ensure it&#8217;s not a phishing or scam attempt that could lead to identity theft.<\/li>\n<li><strong>Use security protection while browsing<\/strong>.\u00a0 Many software products can scan web pages you&#8217;re browsing, alerting you to malicious websites and potential threats.\u00a0 This can keep you safe as you study the latest gossip.<\/li>\n<\/ul>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>The stars are new, but the game is the same.\u00a0 In addition to applying some critical thinking to your web browsing, the same advice from <a href=\"https:\/\/wp.me\/p2wgaW-kin\" target=\"_blank\" rel=\"noopener noreferrer\">2015<\/a>, <a href=\"https:\/\/wp.me\/p2wgaW-iUX\" target=\"_blank\" rel=\"noopener noreferrer\">2014<\/a>, <a href=\"https:\/\/wp.me\/p2wgaW-fwV\" target=\"_blank\" rel=\"noopener noreferrer\">2013<\/a>, <a href=\"https:\/\/wp.me\/p2wgaW-58Q\" target=\"_blank\" rel=\"noopener noreferrer\">2012<\/a>, etc. stands&#8230;&#8230;<\/em><\/p>\n<p><em>Maybe I will get more hits after putting these pop names in here.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005.\u00a0 You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>.\u00a0 Email the Bach Seat <a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attackers using social media-obsessed culture to trick fans into visiting celebrities websites to steal passwords credit card info &#038; more<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2686,2561,2801,2802,2554,2795,2798,2799,608,2774,2796,2269,2800,23,404,2541,1951,4,564,2797],"class_list":["post-81481","post","type-post","status-publish","format-standard","hentry","category-security","tag-2686","tag-amy-schumer","tag-austin-city-limits","tag-bernie-sanders","tag-dangerous-celebrities","tag-donald-trump","tag-ellen-degeneres","tag-hillary-clinton","tag-identity-theft","tag-intel-security","tag-jimmy-fallon","tag-jimmy-kimmel","tag-johnny-carson","tag-malware","tag-mcafee","tag-passwords","tag-retirement","tag-security","tag-social-media","tag-the-late-show-with-stephen-colbert"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/81481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=81481"}],"version-history":[{"count":26,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/81481\/revisions"}],"predecessor-version":[{"id":117096,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/81481\/revisions\/117096"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=81481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=81481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=81481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}