Page 12 - Chinmaya_C8_flipbook
P. 12

E-mail Spoofing

                  When someone sends e-mails that appear genuine from a trusted e-mail ID but in reality they're
                  not to be trusted.

                  For example, a user may receive an e-mail from a portal or social media platform where spelling
                  of service provider or email ID has been slightly changed.
                  For example,

                  mailto:customersupport@tridentportall.com.
                  Notice  that  the  spelling  of "portall"  is            Update the operating system and
                  incorrect.  These  e-mails contain  links                        antivirus timely.
                  which will direct the user to another web
                  page  where  the user would be asked
                  to  enter  information  by  which means                                                 Use secure
                                                                                     Some tips to
                  the user ends up providing personal             Frequently       safeguard from         websites by
                  credentials to cybercriminals. This is also    update your       E-mail Spoofing       looking at the
                                                                                                          lock sign or
                  called as phishing.                            passwords.                               HTTPS on the
                                                                                                          address bar.
                       Spamming
                  It refers  to  the sending  of bulk mail  by              Use two-factor authentication to

                  an identified or unidentified  source.                       log in to e-mail accounts.
                  Sometimes, certain businesses send bulk-advertising mail to many accounts at the same time.
                  Some people intentionally send bulk mails to a user until the mail-server runs out of disk space.

                  Some people send virus-infected applications and files through the Internet via e-mails, chats,
                  games, etc. to get access to your smartphone and personal data. These e-mails may contain a

                  document (Word or Excel file) with malware (dangerous program that can impact your computer)
                  attached to it. Opening such documents results in the malware being installed on your computer
                  or mobile.

                  Some cybercriminals send emails informing the victim that they have won a lottery or a surprise
                  gift. The cybercriminal then asks for personal details and bank details for transferring the winning
                  amount.























                   10   Premium Edition-VIII
   7   8   9   10   11   12   13   14   15   16   17