Page 11 - Computer Genius Class 06
P. 11
Spamming
t re ers to the sending o ul mail y an identified or unidentified source. ometimes certain
usinesses send ul ad ertising mail to many accounts at the same time. ome people intentionally
send ul mails to a user until the mail ser er runs out o dis space.
ome people send irus in ected applications and files through the nternet ia e mails chats games
etc. to get access to your smartphone and personal data. These e-mails may contain a document
ord or cel file ith mal are dangerous program that can impact your computer attached to
it. Opening such documents results in the malware being installed on your computer or mobile.
ome cy ercriminals send emails in orming the ictim that they ha e on a lottery or a surprise
gift. The cybercriminal then asks for personal details and bank details for transferring the winning
amount.
These emails are not to be trusted and one must not reply to them with any personal information.
Further these mails must e immediately deleted rom e mail account to a oid accidental access in
future.
re ie your messages
before opening them.
Some tips to
Use reputable websites safeguard from Do not open doubtful
to download files. Spamming e-mails.
Don’t reply to a
Spam e-mail.
Hacking
t is another common method used y cy ercriminals to trou le ictims. sing mal are or other tric s
to obtain your e-mail ID and password, cybercriminals can gain access to your critical information
like social media accounts, bank accounts, etc.
Safeguarding Your Computer 9

