Send Anonymous Email | Stealth Internet Rotating Header Image

February 3rd, 2009:

Things You Need to Know about Email Fraud

So far, the emails that have been sent congratulating someone for winning a lottery constitute 10% of this year’s sent emails according to the MessageLabs. This is actually three times more than that of last year. According to some, the economic crisis, which has started off at the end of the year, is among the most influential factors in the rapid increase in the number of emails with finance-related spams.

Kinds of email fraud

A spam claiming that you “win a million” is not just the only kind of email fraud online. In fact, there are actually many kinds of email fraud. One of these is this is spoofing. This fraudulent act involves the use of other people’s data to transact online.

In spoofing, the sender’s name and email address is altered or concealed from the recipient. Another kind of email fraud involves bogus offers. In this email fraud, items and services are offered for lower prices as baits to lure people in believing to the bogus offer. Usually, the purpose of this kind of email is to convince some people to divulge their credit card and bank account numbers. There is also the so-called phishing for data. In this kind of email fraud, the cyber criminal extracts information from the victim by making the victim believe that the authority requires some information about him or her.

Preventing email fraud

You have to be skeptical about email messages from unknown sources. You should not share your email accounts and passwords to other people. It is also important that you enable your anti-spam and anti-spyware so you won’t be an easy target for hackers.

Beware of Spyware

Spyware is a computer software that gathers information from the user through the user’s Internet connection. Most of the time, the user is not aware that his or her private information is being accessed. Through a spyware, data such as your Internet habits and the list of sites you visited can be seen by other people without your knowledge. If a spyware has been unintentionally installed in your computer, it can monitor your activity and send the information to someone else.

The most dangerous thing about a spyware is that it can actually access your credit card numbers, passwords, and emails. Spyware can also lead to the crashing of your computer because the transmission of the data by spyware consumes a lot of bandwidth and Internet resources.

Why spyware is used

Spyware is usually used for commercial purposes. One of the strategies is the accession of your email address and sending pop-up advertisement to your account. Other ways include accessing your financial information stored in the Internet’s database.

How to avoid spyware

Because prevention is always better than cure, you ought to do certain things to make sure that you lower the risk of having your computer infected by spyware. Some people say that one of the things that you should do is to use Firefox or Opera as web browsers. Another thing you have to do to get rid of the spyware threat by installing anti-spyware software, you you can download it for free or buy it online.

Dealing with Trojan Threats

What is a Trojan

Like its namesake, a Trojan appears to offer a desirable function to your computer, but actually it only gives malicious functions that can cause damage to your computer or, worse, enable unauthorized access to your private account. Trojan is a malware which, unlike a virus or a worm, does not infect other files in your computer. Though, it can still cause a serious problem to your system.

How can a Trojan damage your system

There are various types of Trojans, depending on the kind of damage it inflicts on your computer or network system. For instance, there is a Trojan that can overwrite data, install viruses, slow down your computer processes, open pornographic sites, corrupt files, or install backdoor to your computer system. And there is also a type of Trojan that can make you your private account susceptible to hackers.

How can you avoid a Trojan infection

One of the best ways to prevent a Trojan from infecting your computer is to install anti-virus software. It is also important that you keep this software updated. Another way is to scan your computer regularly. If your software functions efficiently, you can easily remedy your problem with the Trojan by deleting the files that are infected. The most basic way to avoid a Trojan is by visiting only the sites that you are familiar with or those sites that are safe from Trojan. Because Trojan can hide beneath a desirable site, you have to be very careful when you open a site.

Government Centralized Database: Protection or Violation?

In August 2008, a TV channel in India received an email from this so-called Indian Mujahideen group.  According to the Intelligence Bureau, the case involving this Indian Mujahideen was just a ploy orchestrated by the the outfits banned in India to mislead the investigators. Thorough investigations were conducted to identify the originator of the email. We can see in this case that, though the Internet is tool that can make our work efficient, it can also be used as a tool to spread fear among people.

Is a centralized database the solution

In UK, there is a new email law that could ensure that the Internet can only be used for protecting people and not for spreading terror. This new email law requires the UK’s Internet providers to record all the emails that are being sent and received by every individual in UK. Through this law, events such as that involving the Indian Mujahideen group can be resolved easily. For the proponents of this law, creating a central database could be one of the best ways for the government to safeguard its people.

What are the drawbacks of a centralized database

One of the most important reasons a centralized database is being criticized by many is that they think that this system is a violation of the people’s civil liberties. Aside from this, the new email law in UK claims to safeguard the security of the people from terrorists, yet it does not provide anyone that could safeguard the people from the government itself.

Job Application Through Email

Online job application is the trend today for many job seekers. In this type of job application, you don’t have to go to the company and submit your resume personally; you can just send it through email. Below are some tips that could guide you in applying for a job through email.

Create a cover letter

The cover letter should be written in the body of your email message. Before you write a cover letter, it is important to know the different types of cover letters. One type is the letter of inquiry. Your main purpose in writing this type of cover letter is to make a query regarding the job that would fit your educational background and skills. Another type of cover letter is the job application letter. This type of cover letter is specifically made as a response to the job posting. In this letter, you have to show your talent and skills that you think important for the position that you want.

Customize your resume

To make your resume attention-grabbing, you have to customize it. You have to include those skills and experiences which you think are relevant to the position you are applying to. It is best to use empowering words all throughout your resume. But before you send your resume, you have to ask first if the company requires you to attached it or directly paste it into your email message.

Do NOT forget the subject line

Your subject line is very important because it gives the recipient a hint what your email is all about. You can restate the exact job title you are applying to for your subject.