cyber attack examples

The e-mailer's title is weird Seeing sure you will be surprised. Because the e-mail header contains a password you use and your username. Do not open where! 'You know later about the house' - thinking that e-mail will open up.


The e-mailer's title is weird Seeing sure you will be surprised. Because the e-mail header contains a password you use and your username. Do not open where! 'You know later about the house' - thinking that e-mail will open up.

Because nothing else, this e-mail is a new horror strategy for cyber extortionists.

Do research and teaching about computer security. For this, cybercrime or cyber-crime is to be done regularly, it is to teach the students various techniques of cybercrime. But I am also surprised to see this new study. It is bound to be successful. Because extortionists here have blackmailed the man's psychology through an alarming e-mail. Let's see, what's the matter!

What's in the e-mail

E-mail started in this way (written in English from simple Bangla) - 'Your password is such and such. You do not know me, but I know everything about you, it is unfortunate that I have received secret information about you. '

Then it goes to the threat category

'You have visited such a video/photo site (can understand what kind of "video" site it may be) where we put malware. It has been installed on your computer at the site and control of your computer has come into my hands. We have been able to record all the activities of your computer by utilizing it.

We've recorded your video by launching your webcam immediately. We have now created a video with the left side of which you are sitting secretly watching the naughty video that is on the right, and the video that you were doing was doing naughty by watching the video on the right. All your friends and contact lists have come into our hands.

Now you can have two options without having to do everything. In that case, the copy of this video will be reached by your friends, wife-family, boss-all in one day. And the other option is to send you $ 2700 to save your reputation, through Bitcoin, at the same address. This e-mail contains a secret pixel placement. So, we know that you read the e-mail. If you can not pay the money in one day, then you will break your pats in the market. I have spent a lot of time on this work so I will not give money! And do not tell anyone, but I will leave the video.

And if you want to make sure that this email is real, yes answer. Your naughty video will send you to five friends as a sample.

There is no profit going to the police. Because I'm out of control. Therefore, if you do not want to send these proofs of Akam-Kamaal to everyone, send money quickly. We will delete the video if we get the money. '

This is the criminal threat given to the bat.

What are you afraid of

Now the question is, what should you fear? If you do not go to a naughty site, is someone really holding your pictures of your webcam with your webcam? What is the credibility of this threat? The extortionist is a criminal but has done a great job at the beginning, showed your username and password, so that you believe in him. If your friend knows the secret password, the rest is true! What to do now? Bitcoin to buy to buy? Or will you go to the forest?

No, no! Sleep with the nose oil completely. Why? Tell me now

It's true that the hacker is convincing you by showing your username and password. But after the house, you know?

The incident happened in the past few years in some very big password leaks. Linked-In, Bitli-these organizations have stolen millions of usernames and passwords. And the list of these passwords on the Dark Web is spread. As a result, criminals have a password or links to your site (old).

These companies warned everyone about the matter a year ago, so most people changed their passwords. (If you do not change then change it quickly). But extortion took advantage of it, initially confused you by talking about your old password. You may not believe in other words, but you have easily misled your hidden information by showing Chandbad. Maybe you believe, you've actually made your own video like hackers, and now you'll be able to reveal to everyone right now.

The real incident is that such a video is not in their hands, only the people of Kantola are made to roam the money from them and this extortion work is done. I am sure many people will believe in such e-mails and will send thousands of bits of this address through Bitcoin address. This fraud has been going on for a few months- one of my fellow researchers has been monitoring this extortion group for months. Since July, fraudsters have released millions of e-mails for such fraud.

How to be safe online?

This deception is not necessarily a matter, but how to be safe online? Ensure the security of your computer, update the antivirus regularly. And do not go to unknown websites; At the same time, if someone asks you to click on any link in the e-mail, do not click and click. Do not click on the same message in messenger or other way-even the familiar people send a link, but do not click here.

Because, cybercriminals thus hacked the accounts of people who know many times, send messages from everyone to the Friendliest from there to grab their accounts. After going to any website, it is very easy to solve video record problems with the webcam.

Put a paper or black tape on the webcam, only when it's really a video chat. It can not be recorded by webcam even if your computer enters malware, but no one will be able to record it. And to verify if your password or username has been spread on the Dark Web,  visit  haveibeenpwned



404-redirect,1,5 Best Free,1,Ad Networks,1,Add-Custom-Domain,1,Adsense,9,Adsense Account Without A Website,1,adsense approval,1,Adsense Approval Trick,1,Adsense Disabled Protect,1,adsense invalid click,1,Advanced Excel Keyboard Shortcuts,1,Affiliate Marketing,2,AMP,1,android,7,Android Extensions,1,Android Games,1,android root,1,Android software,3,android software review,2,Android Tips and Tricks,2,artificial intelligence,1,barcode,1,Best-Web-Hosting,1,bitcoin mining,1,Blockchain,1,Blocked Facebook Friends,1,blog,2,Blogger,7,Blogging,2,,1,Bluehost,3,Boost Download Speed,1,Boost Revenue,1,Brain-computer,1,CD,1,Change Domain Name,1,Change Permalinks,1,Chrome,1,Chrome Extensions,1,Chrome Web Store,1,CloudFlare,2,CNAME,1,Command Prompt,1,Computer,15,computer hard disk,1,Computer Processors,1,Computer Tips and tricks,4,Copyright Match Tool,1,Core i3 i5 i7,1,Create a Website,1,Create Free Website,1,Credit Card,1,Cryptocurrency,1,Dark Web,1,Debit Card,1,Deep Web,1,Delete Facebook Account,1,Domain,10,Domain Name,1,Domain Redirects,1,Domain Registrar,2,Domain Search,1,domain search bluehost,1,domain transfer,1,DVD,1,E-commerce,2,Email,1,Email Hack,1,Ethical Hacking,1,Facebook,2,facebook friends block,1,Firewall,2,Firewall Types,1,Forgot Password,1,Free SSL Certificate,1,Freelance,1,Freelancer,2,Games,1,games review,1,Gmail,2,GoDaddy,2,google,3,Google Ads,1,google adsense,4,Google Analytics,1,google chrome,1,Google DNS,1,Google Search Console,1,Google Webmaster,2,Hacking,2,Hacking News,1,Hacking Operating System,1,History of YouTube,1,Hosted,1,Hostgator,1,Hosting,1,Hosting Review,1,How to,6,How-to,9,HTML Sitemap,1,Instagram,1,install WordPress Plugins,1,internet,1,invalid click,1,IP,1,IP address,2,IP Address Block Website,1,IPv4 and IPv6,1,kernel,1,Keyboard,1,Launcher,1,Linux,2,Linux kernel,1,Linux software install,1,localhost,1,Login URL,1,LTD Domain,1,Make Money,1,Make Money Online,1,Make Website,1,Make-Money,2,Marketplace,1,Master Card,1,McAfee,1,McAfee SECURE,1,Namecheap,2,Niche Research,1,Non-Hosted,1,Not Use Free Hosting,1,Nova Launcher,1,Operating System,2,Other,1,password,1,Password Recovery,1,Payoneer,1,Payoneer Master Card,1,Plugins & Tools,1,Prepaid Debit Card,1,QR code,1,QR code generator,1,Quantum Computer,2,Quick Tech,1,Recover Data CD,1,remote shutdown,1,Reset Password,1,Samsung FRP,1,Samsung FRP Unlock,1,Scan With Phone,1,Science technology,2,Search Engine Optimization,1,Search Ranking Factors,1,Security,1,Sell Photos Online,1,SEO,7,SEO Tips,1,Shopping Cart,1,Shortcuts Formula,1,smartphone hang,1,software,2,Sponsored Video,1,SSL,2,SSL Certificate,1,Started Blogging,1,Steem,1,steemit,1,Tech News,2,Transfer Ownership,1,Transfer Domain,2,Twitter,1,URL Shorteners,1,Video Download,1,Virtual Private Network,1,VPN,1,Weak password,1,Web Hosting Reviews,1,Web-Hosting,3,Webmaster Tools,1,website,6,Website SEO,1,Website Transfer,1,WiFi,1,WiFi Router,1,WiFi speed,1,Windows,2,Windows 10,5,Windows 7,1,Windows Firewall,1,Windows Updates,1,woocommerce,1,woocommerce Plugin,1,WordPress,17,WordPress Contacts,1,WordPress gig,1,WordPress Plugin,1,WordPress Plugins,9,WordPress Security,1,WordPress series,1,wordpress software,1,xampp,1,Yoast SEO,1,Youtube,10,YouTube Ad,3,YouTube Ads,1,YouTube Community Guideline,1,YouTube Founder,1,YouTube Monetization,1,YouTube Monitization,2,YouTube Monitization Update,1,YouTube Update,1,
TechJan - Beginner's Guide for Blogging: cyber attack examples
cyber attack examples
The e-mailer's title is weird Seeing sure you will be surprised. Because the e-mail header contains a password you use and your username. Do not open where! 'You know later about the house' - thinking that e-mail will open up.
TechJan - Beginner's Guide for Blogging
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy