David deangelo online dating examples Chatcam4

The following more examples of how hackers will compose an email to trick you: Emails which appear to be a resume.

These emails are composed with the intention of getting the user to open an attachment.

Conclusion Emails and the act of emailing have become a fundamental tool in how we communicate and do business.

Such tactics are effective as they exploit our natural inclination of trust.This exploiting of our trust can happen in numerous ways and how it is done is dependent on the goals of the hacker.If the hacker was looking to steal banking information they will compose an email to appear on a bank asking you for your login credentials for example.The attachment contains a malicious payload which when opened can be installed.This method has been seen in ransomware campaigns, namely Crypto Wall, Golden Eye, and Cerber.

Leave a Reply