0% found this document useful (0 votes)
13 views18 pages

L1 Email Scams

The document discusses various types of computer crime, with a focus on email scams, including phishing, Trojan Horse malware, advanced fee fraud, and virus-generated emails. It outlines how these scams operate, the signs to recognize fraudulent emails, and emphasizes the importance of caution when dealing with suspicious communications. Additionally, it provides strategies for protecting oneself against such scams.

Uploaded by

HazzaYT Hicks
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views18 pages

L1 Email Scams

The document discusses various types of computer crime, with a focus on email scams, including phishing, Trojan Horse malware, advanced fee fraud, and virus-generated emails. It outlines how these scams operate, the signs to recognize fraudulent emails, and emphasizes the importance of caution when dealing with suspicious communications. Additionally, it provides strategies for protecting oneself against such scams.

Uploaded by

HazzaYT Hicks
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Email

scams
Computer Crime and
Cyber Security
Computer Crime and Cyber Security
L1 Email scams

Objectives
• Identify common types of computer crime
• Look at examples of computer crime on the
Internet
• Learn about different types of email scam,
• Recognise the signs of fraudulent emails
Computer Crime and Cyber Security
L1 Email scams

Types of crime
• List different types of crime that are
committed without the use of a computer
• Which of these crimes could be committed
with the use of a computer? How?
Computer Crime and Cyber Security
L1 Email scams

Tackling crime
• Many types of crime be carried out with the
aid of a computer
• The victims can be governments, companies &
organisations and you as individuals
Computer Crime and Cyber Security
L1 Email scams

Cybercrime
• Cybercrime is crime committed using a
computer or a network. Which of these three
statements do you think is true?
– “It makes more money for criminals than illegal
drug trafficking”
– “Someone’s identity is stolen every 10 minutes as a
result of cybercrime”
– “An unprotected PC can become infected within
four minutes of connecting to the Internet”
Computer Crime and Cyber Security
L1 Email scams

Answers:
– “It makes more money for criminals than
illegal drug trafficking” TRUE
– “Someone’s identity is stolen every 10
minutes as a result of cybercrime” FALSE –
it’s every 3 seconds, not every 10 minutes!
– “An unprotected PC can become infected
within four minutes of connecting to the
Internet” TRUE
Computer Crime and Cyber Security
L1 Email scams

Email scams
• There are many types of email scam, here are
four common types:
1. Phishing
2. Trojan Horse / Malware
3. Fraudulent requests for money or advance fees
4. Virus-generated email
Computer Crime and Cyber Security
L1 Email scams

Phishing – what’s this?


• A Phishing email is one that tricks you into handing
over sensitive or personal information (login details,
bank details, etc)
• You receive what looks like a legitimate email, for
example from a bank or an organisation such as
PayPal or eBay
• The website urges you to visit a false website and
enter your personal details, which are then captured
by the Phishers
Computer Crime and Cyber Security
L1 Email scams

Does it work?
• Phishers send out hundreds of thousands
of emails that look as though they are
from legitimate companies
• For phishing to be successful, the
criminals must get you click on a link in
the email to go to a website
• A successful phishing campaign has
around a 5% response rate – meaning 5%
of recipients are conned!
Computer Crime and Cyber Security
L1 Email scams

A typical phishing email

Links to:
http://www.facebo
ok.com.pioateeiili.
com/usersdirector
y/LoginFacebook.p
hp?
ref=48134913582
45886&
Computer Crime and Cyber Security
L1 Email scams

What to look out for


• Greeting. The phishers don’t know your name – just your
email address, so the greeting is not personalised
• The sender’s address is often a variation on a genuine address
• Forged link. The link looks genuine, but it may not link to the
website given. Roll your mouse over it to check
• Request for personal information. Genuine organisations
never do this
• Sense of urgency. Criminals try to persuade you that
something bad will happen if you don’t act fast
• Poor spelling and grammar
Computer Crime and Cyber Security
L1 Email scams

Worksheet 1
• Look at the emails in the worksheet. Decide
which are genuine and which are fraudulent
• What should you do with emails you think
may possibly not be genuine?
Computer Crime and Cyber Security
L1 Email scams

Trojan Horse & Malware email


• Offers something tempting to look at, either an
attachment or link– for example a funny video
• When you open the attachment or click the link, it
installs a virus on your computer
• The virus might
– Record your keystrokes and send them to the attacker
– Provide someone else with access to your files
– Use your computer to send spam to everyone in your
address book
Computer Crime and Cyber Security
L1 Email scams

Example Trojan Horse email


Subject: You just received an E-Greeting!
Fake link! Link is disguised using
Hello , HTML, so doesn’t actually go to the
web address as it appears in the
A Greeting Card is waiting for you at our email.
virtual post office! You can pick up your
postcard at the following web address:

http://www.allyours.net/u/view.php?
id=a0190344376667

visit E-Greetings at http://www.all-yours.net/


and enter your pickup code, which is:
a0190344376667

(Your postcard will be available for 60 days.)


Computer Crime and Cyber Security
L1 Email scams

Advanced fee fraud


• Usually a long and desperate plea for help
• The sender will claim to need cash from you,
in return they will send you millions of pounds
• If it sounds too good to be true, it usually is!
Computer Crime and Cyber Security
L1 Email scams

Virus generated email


• Will appear to be sent from a friend
• Usually means your friend’s email has been
infected with a virus and has sent the email to
their whole address book
• Typically includes a product or shop
recommendation, or asks for emergency cash
• Encourages you to click a link to a sales
website or transfer cash
Computer Crime and Cyber Security
L1 Email scams

Example virus generated email


From a friend’s genuine email
From: James Miller
address
Subject: Amazing cheap electronics!

Hi,

Just had to share this – I just bought a


super cheap mobile phone from this
website – take a look!

http://www.amazingcheap
Asks you to visit a website
deals11611.com/k
Link may download a virus, or lead
you to a bogus website selling fake
or non-existent products
Computer Crime and Cyber Security
L1 Email scams

Protecting yourself against email scams


• Use a SPAM filter to prevent common scams
ever reaching your inbox
• Be suspicious! If you aren’t completely certain
it’s genuine, NEVER click any links or download
attachments.

You might also like