In our increasingly connected world, JOHN HARRIS offers a few tips about how you can avoid falling prey to email evils.
Every now and then, I receive an odd email from a friend or colleague.
What makes these messages strange is that they are both brief and cryptic – and usually come from a webmail account such as Google’s Gmail or Microsoft’s HotMail.
My typical response is to reply, asking if the sender actually intended to send the message.
A couple of months back, a former work experience student answered my query by writing: “Oh no, my email account has been hacked again”.
Email is one of the greatest conveniences of the modern world and one of its greatest pains.
Beyond its legitimate use, there is a legion of dodgy email practices that range from spamming your email account with annoying offers to stealing your online identity.
As you’d expect, there’s even a branch of Geek Speak for the various ways your email can be hijacked.
“Spoofing” describes the process of impersonating someone online, a practice most commonly encountered when your email is misused by a spammer as a fraudulent sender address.
For spammers, “spoofing” offers the double benefit of both covering their tracks and increasing the likelihood of a dodgy email being delivered.
“Phishing” is the name for bogus messages that purport to be from a legitimate company, such as a telco or a bank, offering to assist you in some way or other.
A phishing scam may ask you to: "confirm your information"; "log in to your account" or "create a new password". Just to sweeten the honey trap, it may also offer you a tempting inducement, such as an unbelievable bargain, to extract your credit card details.
If you take the bait, you’ve been tricked into giving up security details that can be used to further inconvenience you, a process called “social engineering”.
“Nigerian scams” are a form of “bait and switch” scam that, according to Wikipedia, belong to a class of fraud dating back to the Renaissance.
I first encountered a Nigerian scam was as a young reporter in 1983 when a fraudulent fax offered great wealth from West African Treasury funds in exchange for access to a local bank account.
It was old hat even then.
The advent of the Internet has turbocharged these scams although many still struggle with sensible syntax in their sentences.
The best way to avoid these Internet threats to your identity and assets is to follow a few simple rules.
Firstly, do not reveal your password to anyone. Even a friend or family member can inadvertantly divulge your details and unleash a lot of grief.
Secondly, install anti-virus software on your computers and make sure you update it daily to protect your system against the latest nasties.
Thirdly, use a spam filter. Although it may occasionally kidnap a legitimate email, it’s a great convenience to avoid the vast volume of dodgy messages that arrives.
Also, ignore unsolicited emails of all types by just deleting them. If a suspicious email comes from a known source, confirm it is legitimate before responding to it.
If it sounds too good to be true, it probably is – so beware.
John Harris is managing director of Impress Media Australia. www.johnharris.net.auRelated News
- What the Government doesn’t want you to know. During a secret mission to Taipei, your correspondent discovered that Taiwan is no longer a bargain basement for cost-conscious technology shoppers.I am corresponding this week fro...
- Intel chips away at the confusion As he looked for a new notebook recently, JOHN HARRIS discovered that even chip giant Intel believes that the confusion caused by computer jargon is a problem. It’s re...
- Data plans remove pain from long haul travel After returning from the patchwork of hotel broadband access in the US, JOHN HARRIS discovers that prepaid global roaming broadband plans may provide the answer. So...
- My Word! What hard work After 18 months using Word 2007, JOHN HARRIS finally discovers how to use the latest version of Microsoft's word processor. BODY { FONT-WEIGHT: normal; FONT-SIZE: 12pt; ...