Jan
15

Avoid being hacked via e-mail

dreamstimefree 1263882 300x225 Avoid being hacked via e mail

Avoid being hacked via e-mail

Prevention is the best medicine as you may have heard in the past from doctors. It is true when it comes to email security. Preventing unauthorized access is the best medicine against this type of attack that’s growing exponentially. See the email below to see what happened to a user. It is an illustration of what hacked email and address book can do in general. This is an email that a scammer sent out to all Linda’s (real name changed) friends by stealing a copy of the Linda’s address book.

Hello

I’m sorry for this odd request because it might get to you too urgent but it’s because of the situation of things right now, I’m stuck in Cardiff Wales with family right now, we came down here on vacation ,we were robbed, the situation seems worse as bags, cash ,credit cards and cell phone were stolen at GUN POINT, It’s such a crazy experience for us, we need help flying back home, the authorities are not being 100% supportive but the good thing is that we still have our passport but don’t have enough money to get our flight ticket back home, please i need you to loan me some money, I will reimburse you right as soon as I’m back home. I promise.

Linda

So how does someone get access to such information as address book?

  1. Keystroke loggers – program designed to monitor every key you press on your keyboard. It is illegal in many countries but it is widely available and scammers use them to steal your passwords whether it is email or bank accounts or online shopping passwords.
  2. Spyware – program designed to steal personal information and your habits such as your internet surfing patterns, sites you visited. These programs usually get installed without the knowledge of users. The presence of a spyware usually causes slow connection speeds, changed home pages, loss of ability to surf internet or non-functionality of programs. Be sure to update and run anti-spyware programs often to detect these types of spyware on your computer.
  3. Viruses – Programs designed to spread and infect other computers. It can appear in different ways in a user’s computer. Purposes of viruses can vary as it is dependent on the creator of these viruses. If you surf the web, you must have up to date anti-virus software.
  4. Firewall – is an appliance or software that is designed to block all unauthorized access from the internet. If you don’t have a firewall, it’s like having your door open in the middle of the night. It’s an invitation for unauthorized users to enter in to your system to do whatever they please. If you have a firewall, make sure to keep it up to date.

The golden rule is to never ever divulge information about your passwords or any personal information. There are no banks or authorities that will ask you for confidential information over emails. Some of us mistakenly assume that hacking won’t affect us – after all, why would someone choose me for email password hacking? The reality is that you can’t be certain about that as hacking happens for a variety of reasons. For example, you might find your account compromised and it’s being used to send spam or malware or your money disappearing from your bank accounts.

It is vital to have to strong password to protect yourself from this type of attacks. My recommendation is to have your password contain one (1) number and eight (8) minimum letters with one uppercase letter. Please be sure to let me know your comments about this article.

Speak Your Mind

*

© tecmaze.com . The content is copyrighted to tecmaze.com and may not be reproduced on other websites