Page 47 - iPlus_Ver_2.0_class_7
P. 47
Hacking
It is another common method used by cybercriminals to trouble victims. Using malware or other
tricks to obtain your e-mail ID and password, cybercriminals can gain access to your critical
information like social media accounts, bank accounts, etc.
Cybercriminals may also send offensive emails to the victim’s contacts via hacking the e-mail.
But not all hacking is destructive in nature. Some hackers use this technique for national security,
creating safer systems, etc. This is known as ethical hacking.
Keep a strong password for your Wi-Fi
connection and keep it changing regularly.
Some tips to
Always download Trusted safeguard from Don’t plug in to devices
Apps from Internet and check hacking you are not sure about.
permissions and authentication.
Always look at the green lock sign ( ) and
htttps at the address bar of the window before
accessing any website to check if it is secure.
E-mail Spoofing
When someone sends e-mails that appear genuine from a trusted e-mail ID but in reality they're
not to be trusted.
For example, a user may receive an e-mail from a portal or social media platform where spelling
of service provider or email ID has been slightly changed.
For example, mailto:customersupport@tridentportall.com.
Notice that the spelling of "portall" is incorrect. These e-mails contain links which will direct the
user to another web page where the user would be asked to enter information by which means
the user ends up providing personal credentials to cybercriminals. This is also called as phishing.
Update the operating system and
antivirus timely.
Some tips to
Use secure websites by
Frequently update safeguard from
looking at the lock sign or
your passwords. E-mail Spoofing
HTTPS on the address bar.
Use two-factor authentication to
log in to e-mail accounts.
45
Ethics and Safety Measures in Computing

