Cyber criminals are interested in celebrity news and popular events not because they are fans but because they can take advantage of unsuspecting online users. This time, they used English model and actress Kelly Brook in their schemes, making the celebrity's name the most dangerous term to search for in 2015.

According to Intel Security's annual study, Kelly Brook topped the list, knocking Cheryl Fernandez-Versini off from the not-so-coveted spot. Regardless of the browser, search inputs such as "Kelly Brook free MP4," "Kelly Brook torrent" and "Kelly Brook free nudes" mostly yield websites with malware in which "Kelly Brook HD downloads" posed the most risk. McAfee SiteAdvisor site ratings were used to determine the amount of risky sites that the search terms generated.

By abusing online users' interest in the latest update or gossip about their favorite celebrities, cyber criminals can infect computers with malware to steal private data for their personal gain.

"The desire for consumers to have access to the latest celebrity gossip can often make them vulnerable to cyber crime," said Nick Viney, vice president of consumer, mobile and small business at Intel Security.

This trend of exploiting celebrity names isn't new, as Emma Watson used to be the riskiest celebrity to search for in 2012. It is effective because popular names generate tremendous traffic, and malicious websites can claim to have the latest showbiz update or news, making them seem legit.

Gary Davis, Intel Security's chief consumer security evangelist, recommends to "only download from verified sites" and to "be strict when sharing your personal information" to be safe online.

Based on Intel Security's report, Kelly Brook is followed by Katie Price in second place and The X Factor judges Nick Grimshaw and Rita Ora in third and fourth place respectively. Victoria Beckham is also included in the list, ranking as the fifth most dangerous celebrity to search for in 2015.

Photo: Chris Amelung | Flickr

ⓒ 2024 TECHTIMES.com All rights reserved. Do not reproduce without permission.
Join the Discussion