Lesson one: Learning The Terminologies related to Spamming
Even with all tools at our disposal to help reduce spamming, we at one time get those annoying messages whether on inbox, news feed or other communication platforms. You have probably seen emails soliciting for your bank details or trying to make you jump into purchasing something. Honestly, I have always deduced this emails to be from fraudulent people but never took time to think about it until recently.
I have been feeling proud of my increased technological sophistication since I joined HOSTAFRICA. True, we only have the best technical team to help resolve your webhosting issues and keep you updated on webhosting trends. So today, I share the first lesson from our technical team lead, Hargreaves Standa, on spamming. Get ready –Take notes!
This is the intentional or unintentional sending of unsolicited emails through your domain account. By unintentional, this might mean someone has access to your domain account or has hacked into your account to send spam. Spamming can either be on your email or on your website or both. In the next lesson, we explore website and email spamming.
This is the attempt to obtain sensitive information e.g. usernames, passwords, credit card details and indirectly money often for malicious reasons. In most cases, users are prompted to enter personal information or even pay for a service at a fake website which looks almost like the legitimate one.
Example, if I registered the domain myname.com today, someone might retrieve my information such as email address and use it to solicit for money. Unsuspecting client might pay thinking the email was from their host. See example below.
Image by; holmpage.com
This is the use of internet services or software with internet access to defraud victims or to otherwise take advantage of them; for example, by stealing personal information, which can even lead to identity theft. The example under phishing is also a scum.
This is a situation in which one person or program successfully masquerades as another by falsifying data, thereby gaining an illegitimate advantage. An example, when email messages are sent with a forged sender address which you have not created. Example firstname.lastname@example.org.
There you go, this is general information on the terminologies we need to know so that we can understand the importance of internet security. In the next lesson, get ready to get into details.