Amazines Free Article Archive
www.amazines.com - Wednesday, October 17, 2018
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133268)
 Advice (160743)
 Affiliate Programs (34733)
 Art and Culture (73614)
 Automotive (145483)
 Blogs (74984)
 Boating (9837)
 Books (17129)
 Buddhism (4122)
 Business (1327909)
 Business News (426289)
 Business Opportunities (366242)
 Camping (10947)
 Career (72722)
 Christianity (15832)
 Collecting (11636)
 Communication (115036)
 Computers (241925)
 Construction (38957)
 Consumer (49617)
 Cooking (17054)
 Copywriting (6567)
 Crafts (18206)
 Cuisine (7532)
 Current Affairs (20367)
 Dating (45756)
 EBooks (19677)
 E-Commerce (48182)
 Education (185088)
 Electronics (83420)
 Email (6389)
 Entertainment (159758)
 Environment (28924)
 Ezine (3038)
 Ezine Publishing (5443)
 Ezine Sites (1552)
 Family & Parenting (110872)
 Fashion & Cosmetics (196366)
 Female Entrepreneurs (11839)
 Feng Shui (130)
 Finance & Investment (310191)
 Fitness (105761)
 Food & Beverages (62803)
 Free Web Resources (7936)
 Gambling (30211)
 Gardening (25056)
 Government (10513)
 Health (628946)
 Hinduism (2156)
 Hobbies (44025)
 Home Business (91542)
 Home Improvement (251191)
 Home Repair (46090)
 Humor (4797)
 Import - Export (5444)
 Insurance (45077)
 Interior Design (29540)
 International Property (3485)
 Internet (190947)
 Internet Marketing (146273)
 Investment (22822)
 Islam (1168)
 Judaism (1357)
 Law (80443)
 Link Popularity (4592)
 Manufacturing (20794)
 Marketing (98719)
 MLM (14136)
 Motivation (18208)
 Music (26993)
 New to the Internet (9475)
 Non-Profit Organizations (4048)
 Online Shopping (129601)
 Organizing (7796)
 Party Ideas (11852)
 Pets (38083)
 Poetry (2234)
 Press Release (12665)
 Public Speaking (5618)
 Publishing (7522)
 Quotes (2407)
 Real Estate (126595)
 Recreation & Leisure (95227)
 Relationships (87412)
 Research (16148)
 Sales (80291)
 Science & Technology (110112)
 Search Engines (23445)
 Self Improvement (153060)
 Seniors (6219)
 Sexuality (35932)
 Small Business (49274)
 Software (82908)
 Spiritual (23439)
 Sports (116451)
 Tax (7657)
 Telecommuting (34073)
 Travel & Tourism (306753)
 UK Property Investment (3117)
 Video Games (13420)
 Web Traffic (11722)
 Website Design (56767)
 Website Promotion (36554)
 World News (1000+)
 Writing (35748)
Author Spotlight
MARC DESCHAMPS

Marc Deschamps is a professional content creator and digital marketing entrepreneur. He runs a numbe...more
ALEN OWEN

I am an essay writer with vast experience in data analysis, PowerPoint writing and research paper ed...more
HANNA ADMIN

Are you married, but not dead? Interested in discreet married dating? Welcome to FindNewPassion.com ...more
BRIAN WILSON

I am a qualified internet marketing professional and content writer with more than 10 years of exper...more
DERRICK REDE

I am Derrick Rede, glad to share the latest trends and solution to motorcycle loves. Motopartscente...more


How to Avoid Being Hacked, Part 1 - Email by Steve Burgess






How to Avoid Being Hacked, Part 1 - Email by
Article Posted: 08/06/2017
Article Views: 871
Articles Written: 36
Word Count: 687
Article Votes: 0
AddThis Social Bookmark Button

How to Avoid Being Hacked, Part 1 - Email


 
Computers,Business,Email
How to Avoid Being Hacked, Part 1 – Email, by Steve Burgess, 2017

Hacking is a common occurrence these days, but it’s good to know that hacking targeting you specifically because of who you are is far less common than scattershot hacking. Additionally, taking advantage of your online data is much more common than taking control of your computer.

Most people don’t understand their computers or operating systems deeply. There’s no shame in that. No one really understands everything about computers. But that makes it easier for those types who are forever trying to make an illicit buck with some new way they have to separate you from your stuff, or some tool they’ve bought to apply leverage to an unprotected digital niche. Furthermore, the digital world changes quickly and it’s much easier for those providing software and hardware to sell insecure wares rather than to take the extra time (and loss of market share) to make them very safe.

So it remains up to us to be more conscious in our behavior online, on the phone, and with our purchased equipment. Some of these conscious behaviors apply across the board to computers, tablets, and phones; others are specific to certain platforms.

Email – Phishing

I got an email from Apple, referencing a recent purchase and asking me to verify it. I clicked on the link and my browser went to Apple’s website, but something didn’t seem quite right. I stopped a moment to think: I had made a purchase online from Apple the previous day, but the email didn’t reference the specific item. I dropped off the website and took a look at the email. I hovered my cursor over the link and sure enough, it didn’t even mention Apple in the link. This is super-common – phishing emails designed to get you to go to some official-looking but bogus website (like the Apple website I’d thought I was on) and enter in your credentials which then give the hacker free access to your online account. And because many people use the same password and login for many of their online accounts it can give the hacker control of your digital life in short order. This happens to people who should know better and even almost happened to me, who also should know better!

But how did they know I had just bought something from Apple, or in other bogus emails – how do they know I just bought something on eBay, or what bank I’m with? How do they even know my email address?

The short answer is – they probably don’t. They send that same email to a million likely email addresses – either from a list they bought, email addresses they harvested online, or just randomly generated by a program (joe@abc.com, joe@def.com, joe@yourwebsite.com, etc) . It costs almost nothing to send an email and it doesn’t cost much more to send a million. It’s easy enough to add an official logo snagged off a corporate website to an email, and it’s similarly easy to make an official-looking website. In fact, one could just snatch the code off an official website and replace the official links with bogus ones that steal your login credentials. Furthermore, a link isn’t always what it appears to be. For instance, if I say to click here to WinAMillionBucks.com you’ll see that it goes to a site that may save you some money, but won’t win you a million bucks.

It can be enlightening to hover (without clicking) your cursor over a given hyperlink like the one above, and see what pops up. Or if nothing pops up, right-click (on a single-button mouse, [ctrl]-click) to reveal the link.

The short form answer to not being taken in like this is: DON’T click on links in emails. Type the desired URL into a browser. Or copy the link, paste it into a text document, and see if it is actually your bank, or Apple, or eBay or where you really wanted to go.

Coming up in part 2: Two-Factor Authentication, Passwords, and Giving Away the Form.

Related Articles - Hacking, Email, Cybersecurity, Data safety,







Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance

World News


GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
SUSAN FRIESEN

Susan Friesen, founder of the award-winning web development and digital marketing firm eVision Media...more
CHRISTOPHER EVANS

Christopher is based in the U.K. and is the author and founder of Critical Eye. ...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
MICHAEL MIFSUD

Michael Mifsud was a House of Commons Commonwealth correspondent at the age of 16. He published Brit...more
ROGER LEWIS FISCHEL

Roger Lewis holds a doctorate in language and literacy from a major midwestern university. His inter...more
STEVE BURGESS

Steve Burgess is a freelance technology writer, a practicing computer forensics specialist as the pr...more
ALEX GREENE

Alex Greene are Senior Editor at Sports Intensity, an online sportsbook review site dedicated to pro...more
AYAD ELHIMER

www.businbook.com is a website that provides listings for local businesses. He currently offers a wi...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2018, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license