The email is one of the most used tools in the professional field and one of the most personal ways to contact people, we can’t work without it. For this reason the mail is the most threatened tool, the hackers try different ways to attack it over and over again.
Nowadays 5 big threads exist that can reach you through email, we will proceed to detail them one by one.
Spam or junk mail are the unwanted and unsolicited messages, usually with an unknown and fake sender, the emails become annoying and saturate our inbox. These mails are usually advertisement that we didn’t request and are of little interest to us.
Email addresses are usually stolen, purchased, collected from websites or taken from mail chains.
Some spammers send only one message, but there are also others who send massively all the weeks the same message that no one reads. It is the best not to answer nor request that they remove you from the list because by doing so you are confirming to the that the mail exists. Therefore the best thing is to ignore it and eliminate it.
Many times this kind of emails can be infected by a malicious software and include some misleading links to download it.
Spam increases every year according to Google’s spam report, over the past year it has grown up to 180%. According to 3AAWG, 90% of the messages sent by mail around the world are spam by what not receiving this type of mail is impossible.
The scam consists of misleading by a fraudulent email. These frauds are made by email chains where “Scammers” try different methods, for example trying to sell a product that doesn’t exist, services that that they will never give to you, a supposed donation to receive, a price or a trip that we will be able to access once we enter the money. Some examples of these messages are: You won the lottery! Millionaire Heritage!
Nowadays 75% of the emails we receive contain some kind of fraud.
Is that kind of software that has the objective of infecting or damaging your computer, phone or tablet inadvertently.
Malwares have the common name of “virus”, but this is wrong since viruses are a type of malware, all viruses are malware but not all malwares are viruses.
Objectives can range from extracting personal information, create zombie teams to send spam, perform DDOS attacks on websites, steal banking information,
destroy data or block them until payment is made, display ads intrusively and even prevent us from accessing our computer.
We can find numerous types of malware, some of the most important are: virus, trojans, worms, spyware, adwares, ransomewares, keyloggers, rootkits and browser hijackers.
Malware accounts for 2.3% of all mail traffic. In 2015 alone for ransomware the total cost of damages was $ 24 million, according to an FBI study that has been echoed by the Japanese company Trend Micro.
It is called phishing to all the techniques and methods that consist of defrauding and obtaining personal data from users to be able to use them in a fraudulent way.
How does it work? The so called “phisher” will pretend to be a person or company, such as our bank, we will get an email with a link to a website, where we will be asked for confidential information. The goal is to have the information of bank cards or information to access certain websites such as our social networks.
Currently 24 of 100 email are phishing, it’s a trend that is rising, as it is very effective and new methods are used every day.
Hoaxes refer to fake news that you get through email chains distributed by mail. At the preset time, this type of hoaxes have been transferred to social networks especially Facebook and Whatsapp
From tranxfer, we give you the opportunity to use an alternative email for a secure sending of your files.