News
2023-07-26 12:19

Financial Security Tips. Part 5. Email Hacking

Hello to All on this Auspicious Day!

They say all work and no#nbsp;play makes one a#nbsp;dull girl or#nbsp;boy. And whilst I’m VERY serious about having fun, I#nbsp;make it#nbsp;happen AFTER my#nbsp;work is#nbsp;done.
However, every year, for one magical day, work really feels a#nbsp;lot like play. .
It’s called International Nelson Mandela day!!!

I’m so#nbsp;proud to#nbsp;live in#nbsp;Madiba’s country of#nbsp;birth, and I’m even prouder to#nbsp;see the beautiful ripple effect his wonderful ways have on#nbsp;mother earth.
On#nbsp;this day, around the world, people unite to#nbsp;heal and build. To#nbsp;serve their community and stand together in#nbsp;proud Madiba-style unity.
Had he#nbsp;been alive today, to#nbsp;thank him I#nbsp;would have written an#nbsp;old school letter to#nbsp;drop in#nbsp;the mail. But, as#nbsp;you know, those get delivered at#nbsp;the pace of#nbsp;a#nbsp;snail!!!

I#nbsp;guess email would have been much better, hey? Easy and fast, leaving more time to#nbsp;play!!! BUT, as#nbsp;they say in#nbsp;those infomercials, "wait, there’s more," and unfortunately, it’s true for email too. Those online scamsters take no#nbsp;time out to#nbsp;play. One of#nbsp;the things they love to#nbsp;do, is#nbsp;to#nbsp;find your inbox. Once they’re in#nbsp;they set themselves up#nbsp;to#nbsp;win. You may be#nbsp;blissfully unaware; your private email is#nbsp;now being shared.
As#nbsp;we’ve been doing since the start of#nbsp;the series, we’ll guide you through this nasty scam too. email hacking is#nbsp;what we#nbsp;look at#nbsp;in#nbsp;Part 5. Helping you to#nbsp;spot it, so#nbsp;you know what to#nbsp;do.

On#nbsp;Tuesday, August 1 I’ll be#nbsp;back with Part 6. So, until then, stay in#nbsp;the mix, with work and play forming part of#nbsp;each day.
As#nbsp;always I#nbsp;thank you for your valuable time!
For now it’s goodbye until next time. .
Sending you love and light,
From Lenny and Lime

Lime’s Art to be Online-Smart Part 5:

Email Hacking
When it#nbsp;comes to#nbsp;sly foxes, online scamsters tick all the crooked boxes. Fraudsters gain unauthorised access to#nbsp;your email address. .. then they send emails to#nbsp;your friends, family, and business partners to#nbsp;defraud them in#nbsp;YOUR name. As#nbsp;is#nbsp;apparent this could leave you with your head hanging in#nbsp;shame.
The inside track they use to#nbsp;hack:
Through malware viruses, they access your emails and contact list. Malware is#nbsp;sophisticated, and even on#nbsp;seemingly safe systems they can exist. Emails are sent to#nbsp;your friends, family or#nbsp;business partners posing as#nbsp;you. They ask them for money#nbsp;— and of#nbsp;course the money is#nbsp;for them, not for you!!!

And here’s another way for them to#nbsp;mine. .. they email your business partners with a#nbsp;fake update for banking. They waste no#nbsp;time. Your suppliers now pay the crooks, whilst you are trying to#nbsp;balance the books!!!
This is#nbsp;what’s behind the veil if#nbsp;hackers gain access to#nbsp;your mail:
  • You start noticing emails are missing
  • You’re not receiving emails which people insist they’ve sent
  • You start to#nbsp;receive unexpected emails
  • Your password has changed#nbsp;— but not by#nbsp;you
  • Unknown emails in "sent items" is#nbsp;a#nbsp;telltale sign too

Well done!!! You’ve reached the end of#nbsp;Part 5. Lenny’s back on#nbsp;Thursday with Part 6 to#nbsp;tell us#nbsp;more about the scamsters' tricks.