Emails asking people to send money abroad so that they can collect lottery money are passe now. Latest is a new online scam with an all new modus operandi that has left even security experts clueless.
Recently a college student received an email from his friend asking for 1,200 pounds (Rs 85,000) as he had lost his wallet. It came from the account of someone she knew and even bore his digital signature. However, later she found out that his friend never wrote the email.
Few months back, a businessman approached the cyber crime cell after some of his friends received a mail from his Hotmail account requesting them to send him Rs 1.27 lakh.
And mind you, such incidents are on a rise, security experts have warned that cyber criminals are hacking mail accounts and sending mails to addresses in the contact list to extract money.
So, how can you make sure you don't become a victim of one? Here are five golden rules to follow to make sure you don't become a victim.
Article Source:- http://infotech.indiatimes.com/quickiearticleshow/3956536.cms
Recently a college student received an email from his friend asking for 1,200 pounds (Rs 85,000) as he had lost his wallet. It came from the account of someone she knew and even bore his digital signature. However, later she found out that his friend never wrote the email.
Few months back, a businessman approached the cyber crime cell after some of his friends received a mail from his Hotmail account requesting them to send him Rs 1.27 lakh.
And mind you, such incidents are on a rise, security experts have warned that cyber criminals are hacking mail accounts and sending mails to addresses in the contact list to extract money.
So, how can you make sure you don't become a victim of one? Here are five golden rules to follow to make sure you don't become a victim.
Article Source:- http://infotech.indiatimes.com/quickiearticleshow/3956536.cms
3 comments:
Scammers are alsoo using government websites to trick people into providing their financial information.
But this provides an intruder with a beacon guiding him to
your network. Forr retrieving emails, the protocols are called thhe Internet Message Access Protocol (IMAP) and Postt Office Protocol (POP).
Here is my page; hacking for free yahoo accounts
==============================================
==============================================
It would strike me that this could be legal if it advertised itself as hiring primarily to people looking for hackers for legal purposes. (i.e. to find potential flaws in systems - aka white hat hackers) Of course, undoubtedly people would hire for less savory purposes, but they might be able to keep some veneer of legality.so should i say i'm lucky to know an hacker (onlinehacker4hire@gmail.com) who that does both?.
================================================
================================================
This is a great news that i must share with you all i have been looking for a way to break into my wife phone because she has a pass-code on her phone and always receiving late night calls and text messages i have been suspecting her for past 1 year then i contacted this hacker named WILLIAMS TECH who helped me hack into her phone and got me results under 24 hours he got me results of her call logs, text messages and even deleted text messages i was so happy to find out the truth about my wife i never knew she was a big time cheat until the HACKER WISETECH helped me, his prices are affordable contact him if you want to know more about your spouse and your relationship state and other services. Email. (wisetechhacker @ gmail.com) . com whatsapp no+(+1 518-749-2846)
Post a Comment