Page 59 - PlusGPT_V2.1_C7_Flipbook
P. 59

These emails are not to be trusted and one must not reply to them with any personal information.
                 Further, these mails must be immediately deleted from e-mail account to avoid accidental access
                 in future.


                 Measures to Avoid Spam
                 To avoid spam, we can take the following measures:

                 •  Preview your messages before opening them.
                 •  Don't click any link in a Spam e-mail otherwise you will invite many such e-mails in your inbox.
                 •  Don’t reply to a Spam e-mail.
                 •  Don't forward an e-mail received from someone you don't know to a list of people.

                      E-mail Account Hacking

                 It is another common method used by cybercriminals to trouble victims. Using malware or other
                 tricks to obtain your e-mail ID and password, cybercriminals can gain access to your critical
                 information like social media accounts, bank accounts, etc.
                 Cybercriminals may also send offensive emails to a victim’s contacts via hacking the e-mail. But
                 not all hacking is destructive in nature. Some hackers use this technique for national security,
                 creating safer systems, etc. This is known as ethical hacking.



                                                            Tech Fact

                     Cracking refers to the act of breaking into systems to steal or destroy data. Crackers may
                       disturb applications by using malware or changing the program of the applications.




                 Measures to Avoid Hacking
                 To prevent unauthorised access  to  your  computer and Internet, we can take  the following
                 measures:

                 •  Keep a password for your Wi-Fi connection and computer.
                 •  Keep changing your passwords.
                 •  Keep updating your operating system.
                 •  Don’t plug in to devices you are not sure about.



                                                                                                   Cyber Security  57
   54   55   56   57   58   59   60   61   62   63   64