Research by cybersecurity giants McAfee every year release a list of celebrities Most Dangerous To Search On Internet. It means that links regarding those celebrities may harm or virus your computer easily. How? Cyber criminals trick people into clicking through potentially malicious websites by using big/trendy/controversial celebrities’ names. These sites are used to install malware or steal personal information and passwords.
The company said it surveyed 900 Web sites and 150 ringtones for its analysis. The celebrities are ranked based on the percentage of search results that were found to be displaying damaging and harmful sites.
Craig David topped the list of most dangerous celebs in 2017 and this year Kim Kardashian surpassed David to the top of the list. Naomi Campbell, ranked as second most dangerous
and Kim’s sister Kourtney, who came third. Singer Adele and Love Island host Caroline Flack completed the top five most dangerous celebrities to look up online in UK along with actress Rose Byrne, Love Island contestant Kem Cetinay (only guy in the list), Britney Spears, actress Emma Roberts and reality star Ferne McCann in the extended list.
Orange Is The New Black actress Ruby Rose topped US version of the list. CNN reports that One in five Internet searches for terms related to “Jessica Biel” former “7th Heaven” star and girlfriend of singer Justin Timberlake, leads to a Web page, photo, video or piece of spam that contains a cyber-security threat. It is followed by singer Beyonce, actress Jennifer Aniston and football hunk Tom Brady Singer and reality TV star Jessica Simpson rounds out the top five in US.
McAfee’s chief scientist Raj Samani said
‘We live in a fast-paced world that’s heavily influenced by pop culture and social media… With Kim Kardashian’s influence and business ventures, people will go to extreme lengths to be a little more like Kim. In our hyper-connected world, it’s important for consumers to think before they click to be sure that they are surfing to safe digital content and protecting themselves from cybersecurity threats that may be used to infect their devices or steal their identity’.