Email Frauds




Email Frauds

Email frauds (or email scam) is the intentional deception made for personal gain or to damage another individual through email. Email is most commonly used for internet communication. An Email address is an unique id to receive and send messages from smartphone, laptop and Desktops using simple mail transfer protocol.

Types of email frauds

  1. Spoofing email
  2. Phishing email
  3. Offers
  4. Request for help

Spoofing Email

Email spoofing is the creation of email messages with a forged or falsely create sender address. An attacker can change MAIL FROM address to his choice with his coding skills.

How to protect from spoofing?

Scammers always try to take the advantage of uncertainty and urgency. These kind of emails will always have character to do something on or before to gain something or not to lost .

Phishing Email Frauds

Phishing is a type of online scam where criminals send an email that appears to be from a legitimate company and ask you to provide sensitive information.

How to identify phishing emails?
legitimate Companies

  1. Never Ask You To Submit Sensitive Information
  2. Usually Call You With Your Name
  3. Have Email Ids In Their Own Domain Name
  4. Know How To Spell
  5. Don’t Force You To Visit Websites
  6. Uses legitimate URL
  7. Don’t Send Attachments like .zip .exe file extensions
  8. Uses Two Step Verification

Offers

Email solicitations to purchase goods or services may be instances of attempted fraud. The fraudulent offer typically features a popular item or service, at a drastically reduced price.

Request for help

The “request for help” type of email fraud takes this form: an email is sent requesting help in some way. However, a reward is included for this help, which acts as a “hook”. The reward may be a large amount of money, a treasure, or some artifact of supposedly great value.

Other articles

  1. How to generate secure password in no time ?
  2. Save Copy screenshot in short cut ways
  3. File and folder management – A professional approach
  4. Cyber threats to mobile devices