criminal activities carried out by means of computers or the Internet.
Phishing
Fake emails (such as lottery emails) requiring for
personal information such as pin number,
passwords, bank account number...
A trick
Check the link
Look out for https:// , it is safer
It could be forged
Roll your mouse over it to check
Dear Client or Customer ( or something general ) on
the email is most likely fake
Fake emails usually have grammatical or spelling errors
If there is an address on the email, check to see if it's fake
Hacking
The unauthorised accessing of a single device (such as a laptop or a
smartphone) or a computer network, and those who engage in the
activity are called hackers
Update your computer or phone to avoid viruses
More people are using technologie now
This is why the levels of hacking are increasing
Bank emails are usually fake
Their message is usually sent by physical letters
Real emails don't usually ask for personal information
Fake emails usually have a sense of urgency
Trojan horse
In computing, a Trojan horse, or Trojan, is any
malware which misleads users of its true intent.
malware
A software that has a virus in it and
damages computers. Malware- malicious
software
Examples of malware are: Trojan horse, worms, spyware,
advertisements, harmful links, virus... and lots more.