- Internet & the Web
E-mail Scams and Malicious Attachments
Scams and Attachments
The Internet is filled with scams. Eventually they will wind up in your e-mail inbox or junk mail. The goal is to get you to click on an attachment, which could infect your computer with a virus, a tracking cookie, and sometimes a Trojan horse.
Don’t open suspicious attachments. Chances are the problem is in the attachment. Just delete it. The virus scanner may show that the attachment is virus free, but the problems mostly happen when you open the suspicious attachment.
Emails end up in your inbox or junk mail that may look like they come from a financial institution or another source that you normally trust. Generally, they say that there was a problem with your account, weather someone tried to hack in or any other problem.
These are the ones that I worry about. Let me give you an example.
Every once and awhile I receive an e-mail that says there is a problem with my pay pal account. (I’ve had similar ones come about my bank) These e-mails come with a link. This link is intended for you to log onto your account from your e-mail. DON’T DO THIS. As soon as you click that link in your e-mail to the sign in page and put in your information, they have you. They now not only have your account numbers, they now have your passwords as well. You can pretty much figure out what comes next. Don’t click from that e-mail, instead open a fresh new page and log in from where you always login from, where you know it’s legit, and if there is a real problem with your account(s) you’ll find out for sure there. I’ll bet not though. Malicious……….
What is Account Phishing?
When someone is attempting to trick other users into giving or providing password information. This is commonly called "phishing". The problem is that unfortunately some people are deliberately using deceptive tactics to request password information from other users.
Malicious Programs in Downloads
It is common for executable (.EXE) files, dynamic link libraries (.DLL files), and batch (.BAT) files being offered as legitimate software to contain malicious software designed to steal account log-in information. Hacks are another very common source of malicious programs. If the software is not distributed from the developers site or trusted download site, then do not download and install the software. If any web site states that you have to install a program or file to use their site. Be very cautious. Some site are software driven but 99.999% are not.