Page 12 - Chinmaya_C8_flipbook
P. 12
E-mail Spoofing
When someone sends e-mails that appear genuine from a trusted e-mail ID but in reality they're
not to be trusted.
For example, a user may receive an e-mail from a portal or social media platform where spelling
of service provider or email ID has been slightly changed.
For example,
mailto:customersupport@tridentportall.com.
Notice that the spelling of "portall" is Update the operating system and
incorrect. These e-mails contain links antivirus timely.
which will direct the user to another web
page where the user would be asked
to enter information by which means Use secure
Some tips to
the user ends up providing personal Frequently safeguard from websites by
credentials to cybercriminals. This is also update your E-mail Spoofing looking at the
lock sign or
called as phishing. passwords. HTTPS on the
address bar.
Spamming
It refers to the sending of bulk mail by Use two-factor authentication to
an identified or unidentified source. log in to e-mail accounts.
Sometimes, certain businesses send bulk-advertising mail to many accounts at the same time.
Some people intentionally send bulk mails to a user until the mail-server runs out of disk space.
Some people send virus-infected applications and files through the Internet via e-mails, chats,
games, etc. to get access to your smartphone and personal data. These e-mails may contain a
document (Word or Excel file) with malware (dangerous program that can impact your computer)
attached to it. Opening such documents results in the malware being installed on your computer
or mobile.
Some cybercriminals send emails informing the victim that they have won a lottery or a surprise
gift. The cybercriminal then asks for personal details and bank details for transferring the winning
amount.
10 Premium Edition-VIII

