Page 11 - CG_v2.1_flipBooks_class_6
P. 11

Spamming

                 It refers to the sending of bulk mail by an identified or unidentified source. Sometimes, certain

                 businesses send bulk-advertising mail to many accounts at the same time. Some people intentionally
                 send bulk mails to a user until the mail-server runs out of disk space.
                 Some people send virus-infected applications and files through the Internet via e-mails, chats, games,
                 etc. to get access to your smartphone and personal data. These e-mails may contain a document
                 (Word or Excel file) with malware (dangerous program that can impact your computer) attached to
                 it. Opening such documents results in the malware being installed on your computer or mobile.

                 Some cybercriminals send emails informing the victim that they have won a lottery or a surprise
                 gift. The cybercriminal then asks for personal details and bank details for transferring the winning
                 amount.


















                 These emails are not to be trusted and one must not reply to them with any personal information.
                 Further, these mails must be immediately deleted from e-mail account to avoid accidental access in
                 future.
                                                          Preview your messages
                                                           before opening them.





                                                               Some tips to
                                 Use reputable websites       safeguard from      Do not open doubtful
                                   to download files.           Spamming                e-mails.





                                                              Don’t reply to a
                                                               Spam e-mail.
                 Hacking

                 It is another common method used by cybercriminals to trouble victims. Using malware or other tricks
                 to obtain your e-mail ID and password, cybercriminals can gain access to your critical information
                 like social media accounts, bank accounts, etc.





                                                                                Safeguarding Your Computer     9
   6   7   8   9   10   11   12   13   14   15   16