Professional Documents
Culture Documents
Email threat
Phising
Spam
virus
What is phishing
Use social engineering techniques through email or instant messaging to
acquire victims personal information
Menggunakan teknik social engineering melalui email atau pesan
singkat untuk mendapatkan data personal yang sensitive dari
seseorang.
The email usually pretends to be from someone trustworthy, like
your bank, UPS/FedEx, a credit card company or an airline, or some
other site for which you may have login credentials. The email
includes a link to an official website that is actually a fake site
operated by the attacker.
What is spam
Email spam, also known asjunk emailorunsolicited
bulk email(UBE), is a subset ofelectronic spam
involving nearly identical messages sent to numerous
recipients byemail. Clicking onlinks in spam emailmay
send users tophishingweb sites or sites that are
hostingmalware
Virus mail
An e-mail virus is computer code sent to you as an email note attachment which, if activated, will cause
some unexpected and usually harmful effect, such as
destroying certain files on your hard disk and causing
the attachment to be remailed to everyone in your
address book.
here are all sorts of things you can find in youre-mailbox. In the "destructive" and/or
"annoying" category go e-mail attachments that contain:
Trojan horses
Worms
Viruses
In many cases, e-mail viruses are not "true" viruses because they cannot replicate without
human interaction. Nonetheless, they have been very effective at shutting down major email systems. SeeHow Computer Viruses Workfor details on viruses.
ATrojan horse, aptly named after the seemingly harmless tool of destruction in
Homer'sIliad, secretly carries often-damaging software in a "plain wrapper." The plain
wrapper is normally an e-mail file attachment from someone you may or may not know.
The file attachment name itself can also be very misleading. When yourun the
attachment, it can do all sorts of things, from erasing files to changing your desktop. It
then sends itself along to other people in your address book so that it can propagate itself.
19 /
DANGER
http://www.amazon.com/update
Name:
DANGER
Credit Card:
John Doe
1234 5678 9101 1213
Confidential Document
2014 Thales
20 /
Confidential Document
2014 Thales