Also known as junk email, it is usually
unsolicited commercial email sent from one
source with identical message sent to
multiple recipients. Although some of them
are not harmful, deleting them one by one will
eat up your time and can clog your email.
Dangerous spam carry virus like Trojan horse
and other malicious software (malware).
EMAIL SPAM
Spammer is the term used to refer to a
person who creates electronic spam.
Spamming is projected to continue
because it is a cheap means of
advertising.
EMAIL SPAM
EMAIL SPOOFING
This refers to deceitful email practice
in which the sender address is
changed, so that i would appear to
have come from a different source
usually someone you know.
Usually, the reply to address is the
source of the email, and when you
unknowingly reply to it you would be
replying to the one who spoofed you.
EMAIL SPOOFING
For example, a spoofed email may
pretend to be from a well-known
shopping website, asking the
recipient to provide sensitive data,
such as a password or credit card
number. Alternatively, a spoofed
email may include a link that installs
malware on the user's device if
clicked.
HTTPS://YOUTU.BE/QDP_ORMFCU8
This is a deceitful practice of trying to
get confidential information such as
passwords and usernames, and
credit card details by making it
appear as if it comes from trustworthy
source.
PHISHING
This is a dangerous hacker attack on
website which directs all traffic to that
web site to other fictitious website.
The main object of pharming is to
obtain username and passwords, as
well as credit card and financial
information, and use these to steal
their money electronically or the use
the credit card of the victims.
PHARMING
Pharming is the major concern of
many online banking and electronic
commerce transactions, which would
compromise many of their clients
accounts as well as the business.
Antivirus and anti-spyware cannot
prevent and protect one from
pharming.
PHARMING
This a computer program that
installed covertly on the personal
computer or even on your mobile
phones to collect information or even
take control without the knowledge of
the user.
It is known that spyware programs will
affect the performance and settings of
the computer or mobile phones.
SPYWARE
This is a dangerous computer
program that replicates itself through
a network.
Some worms delete files, others
disrupt the network function and still,
others send junk mail from infected
computer.
COMPUTER WORM
Computer worm usually spreads by
exploiting weaknesses in operating
system, and manufactures of this
software regularly send free updates
to clients to prevent the spread of the
worms.
COMPUTER WORM
This is a form of a malicious software
(malware) fronting to perform a good
task, but covertly performs undesirable
function with the intention of entering
the computer without the user’s
consent.
Once the malware is installed, the Trojan
horse disabled the computer defenses
opening it to unauthorized entry.
TROJAN HORSE
This is a program that duplicates itself
and infects the computer.
It spreads like a biological virus, wherein
it attaches itself to the host program and
infect other .
The virus can also be transferred by the
use of removable storage such as flash
drives, CD’s or DVD’s, HDD, etc.,
COMPUTER VIRUS
a type of malicious software designed to
block access to a computer system until
a sum of money is paid.
RANSOMWARE
ILOVEYOU, sometimes referred to as the
Love Bug or Loveletter, was a computer
worm that infected over ten million
Windows personal computers on and
after 5 May 2000. It started spreading as
an email message with the subject line
"ILOVEYOU" and the attachment "LOVE-
LETTER-FOR-YOU.TXT.vbs"
ILOVEYOU VIRUS
Onel de Guzman, a then-24-year-old
computer science student at AMA
Computer College and resident of
Manila, Philippines, created the
malware. Because there were no laws in
the Philippines against making malware
at the time of its creation, the Philippine
Congress enacted Republic Act No.
ILOVEYOU VIRUS
ILOVEYOU VIRUS
This is a person who is able to enter and
control other people’s computer
without authorization.
HACKER