0% found this document useful (0 votes)
229 views18 pages

Email Scams: Computer Crime and Cyber Security

This document discusses email scams and how to protect against them. It describes four common types of email scams: phishing scams, which try to steal personal information; Trojan horse/malware emails, which install viruses when opened; fraudulent requests for money; and virus-generated emails. It provides examples of each type of scam email and advises readers to be suspicious of any emails that ask for personal information or urge you to click a link.

Uploaded by

HazzaYT Hicks
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
229 views18 pages

Email Scams: Computer Crime and Cyber Security

This document discusses email scams and how to protect against them. It describes four common types of email scams: phishing scams, which try to steal personal information; Trojan horse/malware emails, which install viruses when opened; fraudulent requests for money; and virus-generated emails. It provides examples of each type of scam email and advises readers to be suspicious of any emails that ask for personal information or urge you to click a link.

Uploaded by

HazzaYT Hicks
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Email scams

Computer Crime and


Cyber Security
Computer Crime and Cyber Security
L1 Email scams

Objectives
• Identify common types of computer crime
• Look at examples of computer crime on the
Internet
• Learn about different types of email scam,
• Recognise the signs of fraudulent emails
Computer Crime and Cyber Security
L1 Email scams

Types of crime
• List different types of crime that are
committed without the use of a computer
• Which of these crimes could be committed
with the use of a computer? How?
Computer Crime and Cyber Security
L1 Email scams

Tackling crime
• Many types of crime be carried out with the
aid of a computer
• The victims can be governments, companies &
organisations and you as individuals
Computer Crime and Cyber Security
L1 Email scams

Cybercrime
• Cybercrime is crime committed using a
computer or a network. Which of these three
statements do you think is true?
– “It makes more money for criminals than illegal
drug trafficking”
– “Someone’s identity is stolen every 10 minutes as a
result of cybercrime”
– “An unprotected PC can become infected within
four minutes of connecting to the Internet”
Computer Crime and Cyber Security
L1 Email scams

Answers:
– “It makes more money for criminals than
illegal drug trafficking” TRUE
– “Someone’s identity is stolen every 10
minutes as a result of cybercrime” FALSE –
it’s every 3 seconds, not every 10 minutes!
– “An unprotected PC can become infected
within four minutes of connecting to the
Internet” TRUE
Computer Crime and Cyber Security
L1 Email scams

Email scams
• There are many types of email scam, here are
four common types:
1. Phishing
2. Trojan Horse / Malware
3. Fraudulent requests for money or advance fees
4. Virus-generated email
Computer Crime and Cyber Security
L1 Email scams

Phishing – what’s this?


• A Phishing email is one that tricks you into handing
over sensitive or personal information (login details,
bank details, etc)
• You receive what looks like a legitimate email, for
example from a bank or an organisation such as
PayPal or eBay
• The website urges you to visit a false website and
enter your personal details, which are then captured
by the Phishers
Computer Crime and Cyber Security
L1 Email scams

Does it work?
• Phishers send out hundreds of thousands
of emails that look as though they are
from legitimate companies
• For phishing to be successful, the
criminals must get you click on a link in
the email to go to a website
• A successful phishing campaign has
around a 5% response rate – meaning 5%
of recipients are conned!
Computer Crime and Cyber Security
L1 Email scams

A typical phishing email

Links to:
http://www.faceboo
k.com.pioateeiili.com
/usersdirectory/Login
Facebook.php?
ref=4813491358245
886&
Computer Crime and Cyber Security
L1 Email scams

What to look out for


• Greeting. The phishers don’t know your name – just your
email address, so the greeting is not personalised
• The sender’s address is often a variation on a genuine address
• Forged link. The link looks genuine, but it may not link to the
website given. Roll your mouse over it to check
• Request for personal information. Genuine organisations
never do this
• Sense of urgency. Criminals try to persuade you that
something bad will happen if you don’t act fast
• Poor spelling and grammar
Computer Crime and Cyber Security
L1 Email scams

Worksheet 1
• Look at the emails in the worksheet. Decide
which are genuine and which are fraudulent
• What should you do with emails you think
may possibly not be genuine?
Computer Crime and Cyber Security
L1 Email scams

Trojan Horse & Malware email


• Offers something tempting to look at, either an
attachment or link– for example a funny video
• When you open the attachment or click the link, it
installs a virus on your computer
• The virus might
– Record your keystrokes and send them to the attacker
– Provide someone else with access to your files
– Use your computer to send spam to everyone in your
address book
Computer Crime and Cyber Security
L1 Email scams

Example Trojan Horse email


Subject:
Subject: You
You just
just received
received an
an E-Greeting!
E-Greeting!
Fake link! Link is disguised using
Hello
Hello ,, HTML, so doesn’t actually go to the
web address as it appears in the
AA Greeting
Greeting Card
Card is
is waiting
waiting for
for you
you at
at our
our email.
virtual
virtual post
post office!
office! You
You can
can pick
pick up
up your
your
postcard
postcard at
at the
the following
following web
web address:
address:

http://www.allyours.net/u/view.php?
http://www.allyours.net/u/view.php?
id=a0190344376667
id=a0190344376667

visit
visit E-Greetings
E-Greetings at
at http://www.all-yours.net/
http://www.all-yours.net/
and
and enter
enter your
your pickup
pickup code,
code, which
which is:
is:
a0190344376667
a0190344376667

(Your
(Your postcard
postcard will
will be
be available
available for
for 60
60 days.)
days.)
Computer Crime and Cyber Security
L1 Email scams

Advanced fee fraud


• Usually a long and desperate plea for help
• The sender will claim to need cash from you,
in return they will send you millions of pounds
• If it sounds too good to be true, it usually is!
Computer Crime and Cyber Security
L1 Email scams

Virus generated email


• Will appear to be sent from a friend
• Usually means your friend’s email has been
infected with a virus and has sent the email to
their whole address book
• Typically includes a product or shop
recommendation, or asks for emergency cash
• Encourages you to click a link to a sales
website or transfer cash
Computer Crime and Cyber Security
L1 Email scams

Example virus generated email


From a friend’s genuine email
From:
From: James
James Miller
Miller
address
Subject:
Subject: Amazing
Amazing cheap
cheap electronics!
electronics!

Hi,
Hi,

Just
Just had
had to
to share
share this
this –– II just
just bought
bought aa
super
super cheap
cheap mobile
mobile phone
phone from from this
this
website
website –– take
take aa look!
look!

http://www.amazingcheap
http://www.amazingcheap Asks you to visit a website
deals11611.com/k
deals11611.com/k
Link may download a virus, or lead
you to a bogus website selling fake
or non-existent products
Computer Crime and Cyber Security
L1 Email scams

Protecting yourself against email scams


• Use a SPAM filter to prevent common scams
ever reaching your inbox
• Be suspicious! If you aren’t completely certain
it’s genuine, NEVER click any links or download
attachments.

You might also like