Page 49 - TP_iPlus_V2.1_Class7
P. 49

These e-mails may contain a document (Word or Excel file) with malware (a dangerous program
                 that can impact your computer) attached to it. Opening such documents results in the malware
                 being installed on your computer or mobile.

                 Some cybercriminals send emails informing the victim that they have won a lottery or a surprise
                 gift. The cybercriminal then asks for personal details and bank details for transferring the winning
                 amount.



















                 These emails are not to be trusted, and one must not reply to them with any personal information.
                 Further, these mails must be immediately deleted from the e-mail account to avoid accidental
                 access in the future.
                                                          Preview your messages
                                                          before opening them.





                                                              Some tips to
                                 Use reputable websites      safeguard from       Do not open doubtful
                                    to download files.         Spamming                 e-mails.





                                                             Don’t reply to a
                                                              spam e-mail.

                    Info Byte

                     In Microsoft Edge, InPrivate browsing allows you to browse the Internet without saving
                     any information about which sites and pages you've visited.


                 Online Transaction Fraud


                 Although at this age, as students, most of us may not be using banking services such as debit
                 card, credit card, net banking, etc., yet it is important to be aware of this type of cybercrime.
                 Online transaction fraud refers to the illegal withdrawal or transfer of money from one bank
                 account to another by a cybercriminal. Online transaction frauds generally take place when a
                 cybercriminal steals a user’s login credentials, bank account details, credit card details, etc.




                                                                                                                  47
                                                                         Ethics and Safety Measures in Computing
   44   45   46   47   48   49   50   51   52   53   54