Email
scams
Computer Crime and
Cyber Security
Computer Crime and Cyber Security
L1 Email scams
Objectives
• Identify common types of computer crime
• Look at examples of computer crime on the
Internet
• Learn about different types of email scam,
• Recognise the signs of fraudulent emails
Computer Crime and Cyber Security
L1 Email scams
Types of crime
• List different types of crime that are
committed without the use of a computer
• Which of these crimes could be committed
with the use of a computer? How?
Computer Crime and Cyber Security
L1 Email scams
Tackling crime
• Many types of crime be carried out with the
aid of a computer
• The victims can be governments, companies &
organisations and you as individuals
Computer Crime and Cyber Security
L1 Email scams
Cybercrime
• Cybercrime is crime committed using a
computer or a network. Which of these three
statements do you think is true?
– “It makes more money for criminals than illegal
drug trafficking”
– “Someone’s identity is stolen every 10 minutes as a
result of cybercrime”
– “An unprotected PC can become infected within
four minutes of connecting to the Internet”
Computer Crime and Cyber Security
L1 Email scams
Answers:
– “It makes more money for criminals than
illegal drug trafficking” TRUE
– “Someone’s identity is stolen every 10
minutes as a result of cybercrime” FALSE –
it’s every 3 seconds, not every 10 minutes!
– “An unprotected PC can become infected
within four minutes of connecting to the
Internet” TRUE
Computer Crime and Cyber Security
L1 Email scams
Email scams
• There are many types of email scam, here are
four common types:
1. Phishing
2. Trojan Horse / Malware
3. Fraudulent requests for money or advance fees
4. Virus-generated email
Computer Crime and Cyber Security
L1 Email scams
Phishing – what’s this?
• A Phishing email is one that tricks you into handing
over sensitive or personal information (login details,
bank details, etc)
• You receive what looks like a legitimate email, for
example from a bank or an organisation such as
PayPal or eBay
• The website urges you to visit a false website and
enter your personal details, which are then captured
by the Phishers
Computer Crime and Cyber Security
L1 Email scams
Does it work?
• Phishers send out hundreds of thousands
of emails that look as though they are
from legitimate companies
• For phishing to be successful, the
criminals must get you click on a link in
the email to go to a website
• A successful phishing campaign has
around a 5% response rate – meaning 5%
of recipients are conned!
Computer Crime and Cyber Security
L1 Email scams
A typical phishing email
Links to:
http://www.facebo
ok.com.pioateeiili.
com/usersdirector
y/LoginFacebook.p
hp?
ref=48134913582
45886&
Computer Crime and Cyber Security
L1 Email scams
What to look out for
• Greeting. The phishers don’t know your name – just your
email address, so the greeting is not personalised
• The sender’s address is often a variation on a genuine address
• Forged link. The link looks genuine, but it may not link to the
website given. Roll your mouse over it to check
• Request for personal information. Genuine organisations
never do this
• Sense of urgency. Criminals try to persuade you that
something bad will happen if you don’t act fast
• Poor spelling and grammar
Computer Crime and Cyber Security
L1 Email scams
Worksheet 1
• Look at the emails in the worksheet. Decide
which are genuine and which are fraudulent
• What should you do with emails you think
may possibly not be genuine?
Computer Crime and Cyber Security
L1 Email scams
Trojan Horse & Malware email
• Offers something tempting to look at, either an
attachment or link– for example a funny video
• When you open the attachment or click the link, it
installs a virus on your computer
• The virus might
– Record your keystrokes and send them to the attacker
– Provide someone else with access to your files
– Use your computer to send spam to everyone in your
address book
Computer Crime and Cyber Security
L1 Email scams
Example Trojan Horse email
Subject: You just received an E-Greeting!
Fake link! Link is disguised using
Hello , HTML, so doesn’t actually go to the
web address as it appears in the
A Greeting Card is waiting for you at our email.
virtual post office! You can pick up your
postcard at the following web address:
http://www.allyours.net/u/view.php?
id=a0190344376667
visit E-Greetings at http://www.all-yours.net/
and enter your pickup code, which is:
a0190344376667
(Your postcard will be available for 60 days.)
Computer Crime and Cyber Security
L1 Email scams
Advanced fee fraud
• Usually a long and desperate plea for help
• The sender will claim to need cash from you,
in return they will send you millions of pounds
• If it sounds too good to be true, it usually is!
Computer Crime and Cyber Security
L1 Email scams
Virus generated email
• Will appear to be sent from a friend
• Usually means your friend’s email has been
infected with a virus and has sent the email to
their whole address book
• Typically includes a product or shop
recommendation, or asks for emergency cash
• Encourages you to click a link to a sales
website or transfer cash
Computer Crime and Cyber Security
L1 Email scams
Example virus generated email
From a friend’s genuine email
From: James Miller
address
Subject: Amazing cheap electronics!
Hi,
Just had to share this – I just bought a
super cheap mobile phone from this
website – take a look!
http://www.amazingcheap
Asks you to visit a website
deals11611.com/k
Link may download a virus, or lead
you to a bogus website selling fake
or non-existent products
Computer Crime and Cyber Security
L1 Email scams
Protecting yourself against email scams
• Use a SPAM filter to prevent common scams
ever reaching your inbox
• Be suspicious! If you aren’t completely certain
it’s genuine, NEVER click any links or download
attachments.