The best way to avoid being a victim of hackers, phishing, and spread of malwares which might harm computers is to be aware of the manners by which they are proliferated. As the cliché goes, “an ounce of prevention is better than a pound of cure”, one must prevent the problem of computer attacks before it gets worse. Here are just some of the numerous messages being spread thru e-mail:
1. Inquiries Coming from Doubtful Senders. Notice that senders use randomly generated characters. Anyone who receives such message must not open or click such link to avert any computer disaster.
This is an enquiry e-mail via http://.....ph/ from:
Ft6qKV pkvqorfnjuih, [url=http://qbtesdihjajh.com/]qbtesdihjajh[/url], [link=http://sogdrvntidmf.com/]sogdrvntidmf[/link],http://dptyhskjqcxl.com/
2. Suspicious Prizes Won or Online Games. Unknown senders usually send these spams to promote their products or online games for a fee. A caveat, statistics show that most of these online promos are scams out to drain the money out of your pocket, or credit cards, as they usually ask for your credit card account.
Plenty of prizes to be won!
Try your hand at the new games. You never know you might be a pro!
This place is really trust worthy and fun
Turn your luck around and become a winner at King Spin Casino
3. Unknown Packages from Supposedly Reputable Handlers
DHL Express Delivery
The parcel was sent your home adress.
More information and the parcel tracking number are attached in document below.
DHL Express Delivery system (c)
Note the blatantly misspelled words common among perpetrators of these schemes. The reader might be tricked in making an inquiry regarding the said package, wherein the sender orders the receiver to open a dubious attachment that might contain malware or any program that might harm or take over one’s computer contents.
When someone receives such e-mail from unknown sources, one must immediately delete the message. If the message mentions that it came from a relative or a company/store the reader has made any transactions, it must be confirmed by sending an e-mail to their correct e-mail address or call them. There is nothing better than hearing the reassuring words of someone you know.
4. Suspicious Messages from Someone in your address book. Just the same, do not follow the suspicious link. It might be a bomb that will open a pandora’s box of trouble with your mouse as the trigger.
5. Chat Message from Unknown Senders
marianchancler6584 (22:29): oqxalnSo... I actually8metjda new guy. you shouldupay attention tooyouv9foreone time.f4getcon the internet67more. start off0hbyuthooking up withea man or womandherekkwrgxowww.iat9tv.com?http://rjbinmx.	findmeIove.	info/bdbd^hmm`unhffcndtvlehixgrclel
marianchancler6584 (23:58): hvltaviHi.ushere'sgwhat's up,3vi'm justacompletely readysjfor something different.xqknbrawww.lqkknm.com?http://rxyjgo.	imhookup.	info/?rdbd^hmm`unhfbquite frankly,a5i'm soa9fed upgpaboutrnever2mgettingvmmy owntlneeds22satisfied.1i0hooked up wiithfanother womanfondthis siteaand then5all of that9changed. you should try ityby yourselfqhand you cantbstop4qif you aren't happy.
As the saying goes, “Curiosity killed the cat”, do not click any of the links (Underlined phrases) contained therein, out of your inquisitive nature. Your e-mail account will be turned into a “zombie” that spreads the same virus, gathering user accounts from you and those in your address book, benefitting only the author of the malware. The account might have been created by the hacker or it was a hacked regular account now being used to hook-up gullible victims. Other instances sometimes occur where a member of your address book is the source of said message. Just ignore the message, because the supposed sender does not even know that she sent such message.
Date of Birth:__________
Place of Birth:____________
Mother’s Maiden Name:_____________
What is the name of your pet?___________
Your trusted Free E-mail Provider usually has a powerful spam filter that blocks these harmful messages. This is also true for the chat providers, usually connected to the e-mail provider. Yet, some of these messages somehow still pass through, for the reason that unscrupulous individuals or groups continuously innovate their methods to bypass the toughest and most updated security features. The best move against them is to be wary and be aware of their trickery. When in doubt, consult a search engine (google or yahoo) regarding the particular message. You might be surprised at the results that can be generated.