Please be careful not to open any PoP’s (Proof of Payments) that are coming into your inbox. The attachment is an html file that contains a payload of malicious code for you especially. This is called phishing.
These payloads can be many forms – keylogger, trojan, spyware, malware, virus…the list is endless, and is testament to how fragile and insecure the internet actually is still.
In fact, you by now should be well aware that opening any forms of communication from anyone who you do not know, is NOT ON! But the new levels o
f deception and cunning, mean you could receive one of these phishing attachments, from an email address you are familiar with. It could be hijacked and used to distribute malicious software for the criminal third party. Who most likely are after your identity. To jack that and ruin your life completely.
As you can see from the image, built-in security measures by your mail provider is more often than not, capable of detecting, and at least warning you of the threat. But the effectiveness across all the mail providers is not that hot. Especially with self-hosted mail servers. These are the most vulnerable and have been the channel that criminals favour for their work.
Hence many of us moving right away from @ourcompany and rather chosen to shack up with Gmail, Hotmail or one of the many others available. I would urge anybody or business to rather move in that direction. The internet would become a helluva lot tidier place.
Professor Tony Turton Weighs In About Water Quality in SA Professor Tony Turton Weighs In…
Duty to Warn: The ANC's Polluted Waterways and the Impact on Tourism Duty to Warn:…
NSRI Advisory: New Moon Spring Tides and Coastal Safety Precautions: NSRI Advisory: New Moon Spring…
Swim Safe: NSRI Top Ten Safety Tips for this December: the extraordinarily pro-active NSRI saves…
Mozambique: Summary of Venâncio Mondlane December 16th Communication Mozambique: Summary of Venâncio Mondlane December 16th…
Do not become a rip current casualty. Swim at lifeguarded beaches. Do not become a…
This website uses cookies.