Learners of English Are Welcome Here!

Category: computer security

How Well Can You Identify Spam with a Dangerous Link? Example #2

SPAM

 

Scams are flooding our telephone lines.

Spammers and hackers are flooding our internet connections and getting viruses, worms, and phishing emails into our computers and email.

Obviously these scammers and hackers have enough success that they are encouraged to scam and hack even more.

How are they so successful?

Can you recognize an attempt to hack into your computer or elicit sensitive information from you when one such email enters your inbox? How well can you PROTECT YOURSELF?

Below is second in our series on how to identify these, what to look for, so that you’re not the victim of a cyber-attack.

The spam message below is easily identifiable as a hacking attempt to infect our computers in so many ways. Being that Apple is so ubiquitous, users can easily think that this message is intended for them.

I’ve broken the hack link, of course.

See how many identifiers you can find.

See below:


Dear (Your email address here),

Please note that your account will expire in less than 48h .
It is imperative to conduct an audit of your information is present, otherwise your account will be destroyed.
Update Your Apple ID
We invite you to act fast, if you need any help you can contact our online support.

Regards,
Apple


I’m able to identify up to ten different obvious identifiers.

Enter your ideas into the “COMMENT” box below.

Let’s see how well you do. Let’s see how safe you are from spammers and scammers!!

Scams and Hackers: Can You Recognize Them?

Scams are flooding our telephone lines.

Spammers and hackers are flooding our internet connections and getting viruses, worms, and phishing emails into our computers and email.

Obviously these scammers and hackers have enough success that they are encouraged to scam and hack even more.

How are they so successful?

Can you recognize an attempt to hack into your computer or elicit sensitive information from you when one such email enters your inbox?

We will begin a series on how to identify these, what to look for, so that you’re not the victim of a cyber-attack.

Below is one spam message that we received the other day.  It is easily identifiable as a hacking attempt to infect our computers in so many ways. I’ve omitted including the hack link, of course.

See how many identifiers you can find.

See below:
___________________________________________________________________________________
Dear Joey,

Your item has arrived at the USPS Post Office at January 23, but the courier was unable to deliver parcel to you.

Download postal receipt attached to e-mail!

 

Kind thoughts,

 

Freddie Horne,

 

USPS Support Agent.
___________________________________________________________________________________

 

 I identified at least ELEVEN errors that immediately stood out to me as an obvious attempt to infiltrate my computer.
What are they?

And the 12th obvious indication?

Please add your responses to the COMMENT box below. Let’s see if we can get all twelve.

© 2009-2024 Software for Students All Rights Reserved -- Copyright notice by Blog Copyright