WHAT IS EMAIL BOMBARDMENT?

Image
An email bombing is an attack on your inbox that involves sending massive amounts of messages to it. Sometimes these messages are incomprehensible. But more often, they will be confirmation emails for newsletters and subscriptions. Thus, in the latter case, the attacker uses a script to search for forums and newsletters on the internet. Then they sign up for an account with your email address. Each will send you a confirmation email, asking you to confirm your address. Also, this process is repeated on as many unprotected sites as the script can find. The term Email Bombing or Email Bombing; it can also refer to flooding an email server with too many emails. In an attempt to overwhelm the server and disable it. But that's not the goal here; it would be a challenge to cut down on the modern email accounts used. Meanwhile, Google or Microsoft email servers, anyway. So instead of a denial of service (DOS) attack; against the email servers you are using. Also, the flood of messages

SPOOFING AND WAYS TO STAY SAFE FROM THEM

WHAT IS SPOOFING?

The ' spoofing' (in English, falsify or deceive) is another technique that phishing is implemented to commit virtual crimes. This methodology involves three parties: the attacker, the attacked and the impersonated virtual system. In order for the cybercriminal to achieve his objective, it is necessary to establish a false communication by intercepting, for example, emails or browsing web pages.

These attacks are classified according to the technology they use. The most common are:

'Web spoofing': It is the impersonation of a real web page by a false one, with the aim of obtaining certain information from a person such as viewed web pages, information from forms, passwords, relevant numbers, etc.

The victim can open the fake web page by any kind of deception, usually accessed through a link. From that moment on, all traffic from the victim's browser passes through a filter program and the cybercriminal can modify any information from and to any server visited by the affected person.

'Email spoofing': This is a fraudulent email. The sender address and subject are modified to appear to be from a trusted source. This is a commonly used technique for 'spam' and ' phishing'. Although the content of most of these emails is irrelevant, the mere act of opening them can cause great risks to computer security.

'IP Spoofing': It consists of replacing the source IP address of a packet with another fraudulent IP address. The 'spoofing' seeks to appropriate the IP of another user on the network. Once the address is spoofed, all information that circulates will be altered and will be directed to the falsified IP.

EMAIL SPOOFING

How to avoid these attacks?

Here are the following tips to prevent computer fraud and preserve personal and professional information, as well as identity:

·       Avoid entering sites by clicking on addresses or links that are received by mail.

·       Pay special attention to the URLs that appear in the status bar to ensure that the address of the site is correct. Although this is a simple and time-consuming action, it is one of the most relevant when it comes to preserving computer data. Verify that the URL you are entering begins with https and has a green padlock.

·       Observe the appearance of websites and emails, as small elements can reveal deception. Unknown senders, strange fonts, fonts or a different style and arrangement of the texts should attract attention in order to detect possible fraud.

·       Do not respond to any email that asks for personal information. Be wary of any entity or person who asks for your passwords, or any other information that may be considered confidential. Never share your passwords or credit card details by phone, email, or SMS.

·       Do not download files of questionable origin or from people you do not know. Doing so can incentivize the installation of viruses, Trojans, etc. which are then used to steal your personal and private data.

·       Check the sender of the mail before opening it.

·       Use proper antivirus to keep you protected from all the viruses and cyber threats that will try to take your information for the wrong use.

Comments

Popular posts from this blog

WHAT IS EMAIL BOMBARDMENT?

TESTING THE ANTIVIRUS THAT YOU USE

BOOT SECTOR VIRUS