BE AWARE WHAT YOU CLICK ON.

Hello all, while I'm new to this forum and new to painting, all i can do is read and learn. So when a topic such as this comes up, this is know and feel confident in my response.
Links are bad enough, but also be aware of attachments, especially pdf. There are many ways to have "key tracking" software installed without your knowledge, via links, attachments, clicking on a picture etc. All malicious software doesn't just happen, it requires the end user (you) to click on the link or attachment and that is what executes the install. The biggest thing to keep in mind is if your email is compromised because of key tracking software, think of this, where do you get all of your alerts, i.e. bill payments, orders, banking information?? Email has become such a critical part of our lives, that a slip of the finger and they can have everything they need to impersonate you ! !
I could go longer about this very subject, probably longer than you care to read, , but the bottom line is if you don't know the sender, didn't request what they are sending you, don't click on it, dont even open it !! Delete it, Mark it as spam. Some emails providers give you the ability to block the sender or domain, do both if possible.
Even your friends / family could be compromised and an attachment sent to you from them via the impersonator!!
I.e. " here's the invoice you requested" or "I wanted to share this pic with you", , some very sofistacated scams out there, , ,
So here are some parting thoughts , ,

If you don't know them , delete it
If you do know them and DIDN'T ask for it, be very cautious, call them and ask if they sent it to you, ,
If you didn't request it, delete it
If you have the computer remember your passwords , ,remove it
If auto fill is turned on , , turn it off

Thank you all for your time and be safe online !
 
Photos in .jpg format can have an executable (.exe etc) hidden within photo. There are 8 bits (short for binary digits) to a "byte", a .jpg uses 5 bits of every byte so a hacker can hide 3 bits of an .exe file in every byte and when clicked the .exe will reassemble and will carry out the hackers instructions. Hackers can encrypt the executable prior to hiding.
 
Back
Top