100% found this document useful (1 vote)
149 views2 pages

Scams and Email Frauds

1. The document discusses various types of email scams including phishing scams, fake lottery scams, Nigerian scams, charity scams, and spear phishing scams. Phishing scams trick people into providing personal information by appearing as legitimate organizations. Spear phishing scams target specific individuals using personal details. 2. It provides details on different phishing techniques like email phishing, spear phishing, whaling, smishing, wishing, and angler phishing that use email, text, phone calls, or social media to deceive victims. 3. Tips are given to prevent email fraud like verifying links, avoiding sending sensitive info over email, backing up data,

Uploaded by

hitakshiverma01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
149 views2 pages

Scams and Email Frauds

1. The document discusses various types of email scams including phishing scams, fake lottery scams, Nigerian scams, charity scams, and spear phishing scams. Phishing scams trick people into providing personal information by appearing as legitimate organizations. Spear phishing scams target specific individuals using personal details. 2. It provides details on different phishing techniques like email phishing, spear phishing, whaling, smishing, wishing, and angler phishing that use email, text, phone calls, or social media to deceive victims. 3. Tips are given to prevent email fraud like verifying links, avoiding sending sensitive info over email, backing up data,

Uploaded by

hitakshiverma01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

TYPES OF SCAMS AND EMAIL FRAUDS

1. Phishing Scams: In this type of email fraud, people receive fraudulent emails that appear as if
they are from trusted organizations such as banks or social media websites. Fraudsters trick
people into providing their personal information.
a. Email Phishing: Most phishing attacks are sent by email. The rogue will register a fake
domain that mimics a real organization and sends thousands of general requests.
Simulated domains often involve character substitution, such as using 'R' and 'N' next to
each other to create 'RN' instead of 'M'.
b. Spear Phishing: There are two other, more sophisticated, types of phishing associated
with email. The first, spear phishing, describes malicious emails sent to a specific person.
Offenders who do so will already have some or all of the following information about the
victim:
i. His name.
ii. Place of employment.
iii. Job title.
iv. Email Address
v. Specific information about their job role.
c. Whaling: Whaling attack is even more targeted, with senior officers being targeted.
Although the ultimate goal of whaling is the same as any other type of phishing attack,
the technique tends to be much higher. Tricks like fake e-links and malicious URLs are
not helpful in this instance, as criminals are attempting to mimic senior employees.
d. Smashing and Wishing: With both smishing and wishing, telephones replace email as
a method of communication. Smashing involves sending text messages to criminals (the
content of which is similar to email phishing), and wishing involves telephone
conversations.
e. Angler Phishing: A relatively new attack vector, social media offers criminals many
ways to deceive people. Fake URLs; cloned websites, posts and tweets; And instant
messaging (which is essentially the same as smishing) can be used to persuade all people
to reveal sensitive information or download malware.

2. Fake lottery scams: In this type of email fraud, people receive emails informing them that they have
won a lottery in which they did not participate. The fraudsters then ask for the winner's personal and
financial information to claim the prize.

3. Nigerian scam: This is an email fraud that is famous all over the world. In such instances, fraudsters
take the form of a wealthy Nigerian prince or wealthy businessman and offer huge cash amounts in
exchange for small amounts of money or personal information.

4. Charity scam: In this type of email fraud, criminals ask the recipient to donate money to a charity that
does not exist. They either ask for direct payments, or trick people into submitting credit card details.

5. "Spear Phishing" scam: This is a highly personal attack involving a carefully crafted email, message or
voicemail that appears to be from a familiar sender. The fraudster would have already collected data on
the target person to be able to share valuable information to them.
WAYS TO PREVENT FROM SCAMS AND EMAIL
FRAUD
 Verify links before you click them. Hover over the link to see if the info (sender/website address)
matches what you expect
 Avoid sending sensitive information over email or texts
 Back up information so that you have another copy
 Apply software updates and patches
 Filter spam emails (unsolicited junk emails sent in bulk)
 Block IP addresses, domain names, and file types that you know to be bad
 Call the sender to verify legitimacy (e.g. if you receive a call from your bank, hang up and call
them)
 Use anti-phishing software that aligns with the Domain-based Message Authentication,
Reporting, and Conformance (DMARC) policy
 Reduce the amount of personal information you post online (e.g. phone numbers and extensions
for employees)
 Establish protocols and procedures for your employees to internally verify suspicious
communications. This should include an easy way for staff to report phishing attacks
 Update your organization’s incident response plan to include how to react if you’re hit with a
phishing attack
 Use multi-factor authentication on all systems, especially on shared corporate media accounts.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy