Send news tips/photos

- advertisement -Click for more information
September 19, 2019 | 8:48pm
- advertisement -Click for more information

Click here to support community news

|

Send news tips/photos

Don’t be Phished

Another in the Computer Questions & Troubles series

- advertisement -Click for more information

Many folks think hackers are geniuses who work technical magic to break into computers. They are wrong. From the secret labs of the PLA Unit 6138 in Shanghai, China, to NSA headquarters at Fort Meade, Maryland, to the Russian foreign intelligence office in Moscow, a single method is used to start almost every attack: phishing. Phishing is a hacker term for an email message that tricks the reader into allowing an invader into their computer system.

Entering a computer by cracking a password or slipping through a gap in the system’s security is possible, but it’s hard and risky, like changing house wiring without turning off the breakers. It takes time and skill, two resources that are always in short supply.

Phishing is much easier and almost everyone has the skills to do a little phishing if they get an aggressive or criminal itch.

Here’s a method that works often:

  1. Open up an email account on a free email service with a fake name.
  2. Use the fake account to send an email asking for the username and password to someone’s bank account.
  3. Tell them a tale:
    • you’re from the bank and you need to fix something.
    • Or tell an older person that you are their grandchild and you want to help them.
- Story continues after advertisement -
Comments Box SVG iconsUsed for the like, share, comment, and reaction icons
Heston Hauling is feeling excited.
Heston Hauling

Our next Abandoned Vehicle Auction is September 28, 2019! Viewing begins at 10:00am and the Auction begins promptly at 12:00PM! Below is a list of our current vehicles for this auction! K means Key. This list is subject to change without notice at any time.

*2004 Kia Rio
*1987 Chevrolet Geo Sprint
*1996 Nissan Maxima
*1985 Ford F-250
*1995 Subaru
*1999 Volvo V70 - K
*2002 Volkswagen Passat - K
*1980 Toyota Pickup/Longbed
*Chevrolet Box Truck
*2010 Audi S4
*1998 Ford Ranger
*2004 Chrysler Pacifica
*2001 Toyota Sienna
*1995 Buick Regal - K
*1985 Honda VT700C
*2003 Hyundai Elantra
*1998 Honda Accord
*1992 Buick Regal
*1993 Honda Accord
*1999 Nissan Maxima
*1993 Buick Regal
*1994 Ford Mustang
*2000 Chevrolet Cavalier
*1996 Audi A4 - K
*1998 Land Rover Range Rover
*1998 GMC Sonoma
*1977 Jambo Motorhome 23'
*2006 Chrysler Pacific - K
*2003 Mitsubishi Lancer
*2001 Chevrolet Malibu
*1991 Toyota Previa
*1979 GMC Suburban
*2003 Kia Spectra
*8 Foot boat and Trailer
*1998 Lincoln Navigator - K
... See MoreSee Less

Comment on Facebook

Y'all have any pictures of that 94 mustang yet?

(360) 312-8697 hestonhaulingwa.com
 
Click for more information

 

Use your imagination. Think up something good. You’ll fail most of the time. But keep trying. Eventually you’ll find someone gullible at an unguarded moment.

Other phishing techniques are a little more difficult, but still easier than breaking in. Email attachments and hyperlinks can be used to secretly run little programs on your computer that invite attackers in.

But, in all seriousness, don’t try any of this. It’s against the law and odds are you will end up with in jail with your computer confiscated. I’m not telling you these tricks to encourage you to try them, but now that you know how it’s done, you can protect yourself.

  • Never reveal your credentials, like account usernames and passwords, in reply to an email. A legitimate service will never ask for credentials in an email.
  • Never open an email attachment unless you are absolutely certain of the source.
  • And don’t click on links in email unless you know how to check them for safety.

You still could be hacked, but by following these simple rules, you have entered the ranks of folks who are harder to hack.


This article has been contributed to My Ferndale News by a member of the community. Click here if you would like information about being a contributor too.

- Story continues after advertisement -

Click for more information

 

- advertisement -Click for more information