SlideShare a Scribd company logo
1 of 14
Download to read offline
LESSON 10
Group 10 St. Thomas Aquinas
Group Members:
Lester Aporado
Ejay Mark Ambeguia
Krizalyn De Vera
ONLINE CRIMES AND
HAZARDS
Hacking is unauthorized use of someone else's computer or online account.
E-mail hacking is one of the most common types of online hacking because it is where most
information on a user's online accounts can be found. Once a hacker is able to enter your e-mail
account, he or she would be
ableto view your personal information and access your other online accounts, giving him the power
to do unauthorized transactions or activities through your account.There are many ways for
hacking to happen. For one, if anyone has access to a computer you are using, it's easy to install a
keystroke logger (keylogger) software, a program which allows the hacker to know everything
you type, such as passwords. Hackers can also use trial and error in the input of passwords, relying
on Personal information they know about you such as birthdays or names of loved ones. Viruses
can also be used to get into your computer to harvest information. Furthermore, there are many
professional hackers online whom people pay to hack any account.
HACKING
As mentioned earlier, hacking can also occur through computer viruses. A computer virus
is a computer program that spreads from one computer to another computer and
interferes with computer operation. If your computer is infected with a virus, it can
corrupt or delete any data you have stored or even delete everything on your hard disk.
Viruses are commonly spread through attachments in e-mail messages, links in instant
messages, or through files and programs you download online.
Three of the most common types of computer virus are trojans, worms, and e-mail
viruses. A trojan is a computer program that appears to be an interesting or familiar
application, file, or e-mail attachment, but is only masquerading as such or hiding malware
that causes damage when you click and run it. Trojans can do a number of nasty things on
your computer, the least of which tracks your browsing habits, but in severe cases may
even cause your computer from functioning properly.
VIRUSES
The sneaky nature of trojans allows them to enter the victim's computer undetected, but
once in, they can be a nuisance, frequently making their presence known.
A worm is a small piece of software that uses computer networks and security flaws to
replicate itself. More complex than trojans (although they can be brought in by one),
worms usually attack multi-user systems and can spread over a network of computers
through e-mail circulation.
An e-mail virus spreads as an attachment to e-mail messages and replicates itself by
automatically mailing itself to dozens of people in the victim's e-mail address book. Some
e-mail viruses don't even require you to double-click as they automatically launch when
you preview an e-mail message.
VIRUSES
A spam is the electronic equivalent of junk mail. Spamming is flooding message
accounts over the Internet with copies of the same message, mostly to advertise,
campaign something, and distribute jokes or words of wisdom to a lot of people at
the same time. Spam costs very little to send, hence "spammers" use this method to
advertise their products, services, or schemes to as many people as possible. Below
are some of the most common types of spam and their definitions.
SPAMMING
TYPES OF SPAMMING
When Spammed
You may not be able to totally avoid receiving spam messages, but you can take the necessary precautions so as not to be a victim of spam abuse.
Here are some pointers.
1. Be selective when responding to messages.
If you receive any unwelcome advertising in an e-mail, private message, or any other function, don't send a reply in any form, such as by clicking
on any link. Doing so would inform the spammer that you exist. If you receive a message that is obviously spam, delete it immediately without
opening. Spam messages often use nonsensical or meaningless subject heads with liberal use of characters or all caps.
2. Be careful of signing up or posting to various websites.
When registering on a website or online group, don't use your personal or business e-mail address. Create another e-mail address specifically for
this purpose. It's also advisable to disguise your e-mail address when posting it to websites. Instead of using plain text such as
girl.free@yahoo.com, strip out periods and "@" symbols and use GIRL FREE AT YAHOO DOT COM to prevent spam crawlers from identifying your e-
mail address. Furthermore, avoid using your e-mail address as your screen name in chat rooms or online forums.
3. Create e-mail filters.
There are various ways to filter your e-mail and separate the genuine e-mails from those that are junk. No filter is 100% effective but a good
filter can lessen the amount of spam you receive significantly. Most of the common e-mail services such as Yahoo! and Gmail offer a standard
filtering service. If you want extra protection, you can install additional filtering software such as Mailwasher (www.mailwasher.net) or subscribe
to the paid filter of your service provider.
4. Make sure not to aid in perpetuating forwarded messages.
Forwarded e-mails often list the e-mail addresses of everyone who has forwarded the message as well as the e-mail addresses of the recipients,
making it easy for spammers to find long lists of e-mail addresses to target. To avoid forwarding, use the copy-paste option to transfer the
content you wish to send in a fresh e-mail.
There are many variations of frauds and scams on the Internet created by fake
sellers who use computer services to promote bogus services, products, and
investment opportunities, among others. The common goal is to fool you into giving
away money and/or bank information. But you have to find a balance between
caution and adopting a go-for-it attitude. The overly cautious trait of people can
actually prevent them from finding new legitimate opportunities. Not everything
suspicious you encounter on the Internet is a scam. Some are actually worthwhile
checking out.
FRAUDS AND SCAMS
What follows is a list of guidelines to give you a nose for online frauds or scams:
1. If something is too good to be true, then most likely it is.
If a certain site says you can get an unbelievably large amount of money quickly with the least effort or investment,
then it is likely bogus as no such kind of business opportunity exists in the real world. Indeed, such offers will generate
big money quickly, but only for the scammer and not for you! Legitimate offers are usually those that come from
companies that have been in the business for a long time, promise reasonable returns, have other financial interests, and
have earned credibility with members through the years.
2. Be wary of products that are offered too cheap.
If a certain product is offered too cheap than usual, don't rush into buying as there may be a catch, particularly if the
product is a physical object and not just a digital file that can be downloaded.
FRAUDS AND SCAMS
3. Be cautious of buyers or sellers who have insufficient contact information provided on their sites.
Legitimate and certified businesses are registered and often provide complete contact information such as phone
numbers, office location, and e-mail addresses.
They also have well-written copy in English. Petty scammers often work alone (or with a handful of cronies), are often
careless (in spite of their technical know-how), write poorly, and design pages hastily with little regard for taste or the
target customers.
4. Research will go a long way.
Just because a seller has logos of affiliations or certifications from "credible organizations" doesn't mean you can
already trust it outright. These so-called credentials are not assurances you will not be duped. Check to see if those
organizations indeed exist. Check for any feedback on the company and try calling or e-mailing support.
FRAUDS AND SCAMS
COMMON TYPES PF ONLINE FRAUDS AND SCAMS
Cyber stalking is the use of the Internet by an individual or a group of individuals to harass another
individual, group of individuals, or organization. Cyber stalking can involve threats, identity theft, false
accusations, solicitation of minors for sexual purposes, and gathering of information for harassment
purposes. Cyber stalkers often meet or target their victims through search engines, online forums,
bulletin boards, chat rooms, and social networks. They attempt to track or follow the victim's Internet
activity. They can also post derogatory statements about their stalking target on websites to harass
the victim. Victims of cyber stalking may not even know they are being stalked. Cyber stalking can
disrupt the lives of victims and cause a lot of fear and a feeling of being threatened.
CYBER STALKING
THANK YOU

More Related Content

Similar to LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS

phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitssuser64f8f8
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? The TNS Group
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfChinmayee Behera
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxamby3
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxvdgtkhdh
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptxAbdulHaseebKhan34
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Internet issues
Internet issuesInternet issues
Internet issuesCJ900
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacksNamik Heydarov
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of ITMahdiRahmani15
 
The internet and safety
The internet and safetyThe internet and safety
The internet and safetyPatricia bb
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsShred Station
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe onlineScott Schober
 

Similar to LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS (20)

phishing facts be aware and do not take the bait
phishing facts be aware and do not take the baitphishing facts be aware and do not take the bait
phishing facts be aware and do not take the bait
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You? Are Phishing Attacks Angling For You?
Are Phishing Attacks Angling For You?
 
Ways To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdfWays To Protect Yourself From Spam (Presentation).pdf
Ways To Protect Yourself From Spam (Presentation).pdf
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Internet issues
Internet issuesInternet issues
Internet issues
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
The internet and safety
The internet and safetyThe internet and safety
The internet and safety
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Fraud Awareness Guide for Individuals
Fraud Awareness Guide for IndividualsFraud Awareness Guide for Individuals
Fraud Awareness Guide for Individuals
 
Internet safety
Internet safetyInternet safety
Internet safety
 
11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online11 Cybersecurity Tips to stay safe online
11 Cybersecurity Tips to stay safe online
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 

Recently uploaded

Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 

Recently uploaded (20)

Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 

LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS

  • 1. LESSON 10 Group 10 St. Thomas Aquinas Group Members: Lester Aporado Ejay Mark Ambeguia Krizalyn De Vera
  • 3. Hacking is unauthorized use of someone else's computer or online account. E-mail hacking is one of the most common types of online hacking because it is where most information on a user's online accounts can be found. Once a hacker is able to enter your e-mail account, he or she would be ableto view your personal information and access your other online accounts, giving him the power to do unauthorized transactions or activities through your account.There are many ways for hacking to happen. For one, if anyone has access to a computer you are using, it's easy to install a keystroke logger (keylogger) software, a program which allows the hacker to know everything you type, such as passwords. Hackers can also use trial and error in the input of passwords, relying on Personal information they know about you such as birthdays or names of loved ones. Viruses can also be used to get into your computer to harvest information. Furthermore, there are many professional hackers online whom people pay to hack any account. HACKING
  • 4. As mentioned earlier, hacking can also occur through computer viruses. A computer virus is a computer program that spreads from one computer to another computer and interferes with computer operation. If your computer is infected with a virus, it can corrupt or delete any data you have stored or even delete everything on your hard disk. Viruses are commonly spread through attachments in e-mail messages, links in instant messages, or through files and programs you download online. Three of the most common types of computer virus are trojans, worms, and e-mail viruses. A trojan is a computer program that appears to be an interesting or familiar application, file, or e-mail attachment, but is only masquerading as such or hiding malware that causes damage when you click and run it. Trojans can do a number of nasty things on your computer, the least of which tracks your browsing habits, but in severe cases may even cause your computer from functioning properly. VIRUSES
  • 5. The sneaky nature of trojans allows them to enter the victim's computer undetected, but once in, they can be a nuisance, frequently making their presence known. A worm is a small piece of software that uses computer networks and security flaws to replicate itself. More complex than trojans (although they can be brought in by one), worms usually attack multi-user systems and can spread over a network of computers through e-mail circulation. An e-mail virus spreads as an attachment to e-mail messages and replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e-mail viruses don't even require you to double-click as they automatically launch when you preview an e-mail message. VIRUSES
  • 6. A spam is the electronic equivalent of junk mail. Spamming is flooding message accounts over the Internet with copies of the same message, mostly to advertise, campaign something, and distribute jokes or words of wisdom to a lot of people at the same time. Spam costs very little to send, hence "spammers" use this method to advertise their products, services, or schemes to as many people as possible. Below are some of the most common types of spam and their definitions. SPAMMING
  • 8. When Spammed You may not be able to totally avoid receiving spam messages, but you can take the necessary precautions so as not to be a victim of spam abuse. Here are some pointers. 1. Be selective when responding to messages. If you receive any unwelcome advertising in an e-mail, private message, or any other function, don't send a reply in any form, such as by clicking on any link. Doing so would inform the spammer that you exist. If you receive a message that is obviously spam, delete it immediately without opening. Spam messages often use nonsensical or meaningless subject heads with liberal use of characters or all caps. 2. Be careful of signing up or posting to various websites. When registering on a website or online group, don't use your personal or business e-mail address. Create another e-mail address specifically for this purpose. It's also advisable to disguise your e-mail address when posting it to websites. Instead of using plain text such as girl.free@yahoo.com, strip out periods and "@" symbols and use GIRL FREE AT YAHOO DOT COM to prevent spam crawlers from identifying your e- mail address. Furthermore, avoid using your e-mail address as your screen name in chat rooms or online forums. 3. Create e-mail filters. There are various ways to filter your e-mail and separate the genuine e-mails from those that are junk. No filter is 100% effective but a good filter can lessen the amount of spam you receive significantly. Most of the common e-mail services such as Yahoo! and Gmail offer a standard filtering service. If you want extra protection, you can install additional filtering software such as Mailwasher (www.mailwasher.net) or subscribe to the paid filter of your service provider. 4. Make sure not to aid in perpetuating forwarded messages. Forwarded e-mails often list the e-mail addresses of everyone who has forwarded the message as well as the e-mail addresses of the recipients, making it easy for spammers to find long lists of e-mail addresses to target. To avoid forwarding, use the copy-paste option to transfer the content you wish to send in a fresh e-mail.
  • 9. There are many variations of frauds and scams on the Internet created by fake sellers who use computer services to promote bogus services, products, and investment opportunities, among others. The common goal is to fool you into giving away money and/or bank information. But you have to find a balance between caution and adopting a go-for-it attitude. The overly cautious trait of people can actually prevent them from finding new legitimate opportunities. Not everything suspicious you encounter on the Internet is a scam. Some are actually worthwhile checking out. FRAUDS AND SCAMS
  • 10. What follows is a list of guidelines to give you a nose for online frauds or scams: 1. If something is too good to be true, then most likely it is. If a certain site says you can get an unbelievably large amount of money quickly with the least effort or investment, then it is likely bogus as no such kind of business opportunity exists in the real world. Indeed, such offers will generate big money quickly, but only for the scammer and not for you! Legitimate offers are usually those that come from companies that have been in the business for a long time, promise reasonable returns, have other financial interests, and have earned credibility with members through the years. 2. Be wary of products that are offered too cheap. If a certain product is offered too cheap than usual, don't rush into buying as there may be a catch, particularly if the product is a physical object and not just a digital file that can be downloaded. FRAUDS AND SCAMS
  • 11. 3. Be cautious of buyers or sellers who have insufficient contact information provided on their sites. Legitimate and certified businesses are registered and often provide complete contact information such as phone numbers, office location, and e-mail addresses. They also have well-written copy in English. Petty scammers often work alone (or with a handful of cronies), are often careless (in spite of their technical know-how), write poorly, and design pages hastily with little regard for taste or the target customers. 4. Research will go a long way. Just because a seller has logos of affiliations or certifications from "credible organizations" doesn't mean you can already trust it outright. These so-called credentials are not assurances you will not be duped. Check to see if those organizations indeed exist. Check for any feedback on the company and try calling or e-mailing support. FRAUDS AND SCAMS
  • 12. COMMON TYPES PF ONLINE FRAUDS AND SCAMS
  • 13. Cyber stalking is the use of the Internet by an individual or a group of individuals to harass another individual, group of individuals, or organization. Cyber stalking can involve threats, identity theft, false accusations, solicitation of minors for sexual purposes, and gathering of information for harassment purposes. Cyber stalkers often meet or target their victims through search engines, online forums, bulletin boards, chat rooms, and social networks. They attempt to track or follow the victim's Internet activity. They can also post derogatory statements about their stalking target on websites to harass the victim. Victims of cyber stalking may not even know they are being stalked. Cyber stalking can disrupt the lives of victims and cause a lot of fear and a feeling of being threatened. CYBER STALKING