WHAT IS EMAIL BOMBARDMENT?

Image
An email bombing is an attack on your inbox that involves sending massive amounts of messages to it. Sometimes these messages are incomprehensible. But more often, they will be confirmation emails for newsletters and subscriptions. Thus, in the latter case, the attacker uses a script to search for forums and newsletters on the internet. Then they sign up for an account with your email address. Each will send you a confirmation email, asking you to confirm your address. Also, this process is repeated on as many unprotected sites as the script can find. The term Email Bombing or Email Bombing; it can also refer to flooding an email server with too many emails. In an attempt to overwhelm the server and disable it. But that's not the goal here; it would be a challenge to cut down on the modern email accounts used. Meanwhile, Google or Microsoft email servers, anyway. So instead of a denial of service (DOS) attack; against the email servers you are using. Also, the flood of messages

AVOID BEING A VICTIM OF RANSOMWARE

Advances in information technology have brought countless advantages and facilities to everyday life. Its consolidation has promoted productivity and efficiency in production processes and has contributed fundamentally to the advancement of science in areas as important to human beings as medicine and communications. In financial matters, technologies have promoted facilities in the use of transactional channels along with benefits in costs and access, as well as contributing to the achievement of financial inclusion and education.

avoid being victim of ransomware
However, the digitization of information has brought with it significant risks in terms of computer security. The infrastructure on which the data is supported and the technological functionalities carry security threats due to their inherent vulnerabilities. Computer attacks have advantages over "physical" fraud or common scams because anonymity is facilitated, helping to generate economies of scale in the attacks, in addition to the fact that they have a wide range of theft techniques and modalities.

What is Ransomware?

Ransomware refers to a specific class of malicious software that encrypts data, and then requests a "ransom" and can "release" the information. This example will help you better understand:

Imagine that you are completing your thesis to complete your undergraduate degree, it has taken a lot of time and effort and you must submit it next week. Snooping in your mail you find a message that says "Attractive job offer" you decide to open it and click on the attached file, which downloads the malware without you noticing, it infects your computer and blocks all your files (Including the thesis).

All you can see on the screen is a message which indicates that you must pay a large sum of money to regain access to your documents. Without a doubt, it is an unfavorable situation, with only a few days left to present the work, you do not have many options. Now, imagine this same problem and the magnitudes that it can take if an attacker manages to control the information system of the flight reservations of a large airline or the information of the sales made by a supermarket.

It is important to note that at present the payment of ransomware for Ransomware is requested through bitcoins and other cryptocurrencies, which favors anonymity, makes it difficult to track the resources caused by fraud and complicates prosecution processes.

Recommendations and Considerations

The National Government, through the Ministry of Defense, the Ministry of Information and Communication Technologies (MinTic), the National Police and the Colombian Cyber   Emergency Response Group (ColCert) deliver a series of recommendations to face the new variants of this threat.

Have A Backup Copy Of Your Information.

Make updates to operating systems. For these to be effective, the software must be legal, particularly, it is important to consult the catalog with Microsoft updates.

For entities or companies that have computers with their operating systems without updating, it is best to disconnect them from the internet.

Avoid opening emails with suspicious attachments that appear to alert you to legal charges, lawsuits, or the like.

If a message is received from a bank or government entity, verify that the domain or link of the web page that is in the message really is the one that officially represents the entity or person referred to.

Never share requested personal or financial information through emails, phone calls, text messages or social media.

Do not open messages or attachments from unknown senders.

Be careful with the websites you visit, be wary of domains you do not know.

Do not download software from untrusted sites.

Do not download multimedia content through P2P exchange networks such as Ares.

Use Antivirus Software to be protected from it.

Avoid connecting removable devices that are not reliable.

Comments

Popular posts from this blog

WHAT IS EMAIL BOMBARDMENT?

TESTING THE ANTIVIRUS THAT YOU USE

BOOT SECTOR VIRUS