Jessica Biel tops Hollywood malware list

By

Actress trumps Brad Pitt as top cybercrime lure.

Actress Jessica Biel has been named as the most dangerous celebrity name in cyberspace.

Jessica Biel tops Hollywood malware list

McAfee said in its annual celebrity search report that a query for Biel's name was more likely to lead a user to a malicious site than any other celebrity search. Biel ousts Brad Pitt, who fell to the number 10 spot in 2009.

The company noted that searching for screensavers of Biel was especially troublesome. McAfee found that roughly half of all Jessica Biel screensaver downloads contained malicious software.

Second on the list was actress and pop star Beyonce, who also claimed the number 2 spot last year. Actress Jennifer Aniston was third, followed by American football star Tom Brady and singer Jessica Simpson.

The use of celebrities as a lure has become increasingly popular with cyber criminals in recent years. Malicious sites often claim to offer photos or video files of celebrities or popular news topics in an effort to infect users with malware.

"Cybercriminals are star watchers too, they latch onto popular celebrities to encourage the download of malicious software in disguise," said McAfee Avert Labs senior vice president Jeff Green.

"Consumers’ obsession with celebrity news and culture is harmless in theory, but one bad download can cause a lot of damage to a computer."

Got a news tip for our journalists? Share it with us anonymously here.
Copyright ©v3.co.uk
Tags:

Most Read Articles

"Widespread data theft" hits Salesforce customers via third party

"Widespread data theft" hits Salesforce customers via third party

Melbourne dev finds gift card PINs can be brute-forced

Melbourne dev finds gift card PINs can be brute-forced

Western Sydney University targets file-sharing sites hosting stolen data

Western Sydney University targets file-sharing sites hosting stolen data

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Travel eSIMs secretly route traffic over Chinese and undisclosed networks: study

Log In

  |  Forgot your password?