Page 11 - Computer Genius Class 06
P. 11

Spamming

                  t re ers to the sending o   ul  mail  y an identified or unidentified source.  ometimes  certain

                  usinesses send  ul  ad ertising mail to many accounts at the same time.  ome people intentionally
                 send  ul  mails to a user until the mail ser er runs out o  dis  space.
                  ome people send  irus in ected applications and files through the  nternet  ia e mails  chats  games
                 etc. to get access to your smartphone and personal data. These e-mails may contain a document
                   ord or   cel file   ith mal are  dangerous program that can impact your computer  attached to
                 it. Opening such documents results in the malware being installed on your computer or mobile.

                  ome cy ercriminals send emails in orming the  ictim that they ha e  on a lottery or a surprise
                 gift. The cybercriminal then asks for personal details and bank details for transferring the winning
                 amount.


















                 These emails are not to be trusted and one must not reply to them with any personal information.
                 Further  these mails must  e immediately deleted  rom e mail account to a oid accidental access in
                 future.
                                                           re ie  your messages
                                                           before opening them.





                                                               Some tips to
                                 Use reputable websites       safeguard from      Do not open doubtful
                                   to download files.           Spamming                e-mails.





                                                              Don’t reply to a
                                                               Spam e-mail.
                 Hacking

                  t is another common method used  y cy ercriminals to trou le  ictims.  sing mal are or other tric s
                 to obtain your e-mail ID and password, cybercriminals can gain access to your critical information
                 like social media accounts, bank accounts, etc.





                                                                                Safeguarding Your Computer     9
   6   7   8   9   10   11   12   13   14   15   16