Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Listed Article

  Category: Articles » Technology » Computers » Article
 

Could Your Email Compromise Your Safety?




By Tim Henry

Hackers, phishers, viruses, worms…simply having your computer online can expose your data and personal information to all kinds of malicious and worrisome problems. If you're somewhat new to the 'net' or to computers in general, these four tips could help protect you from identity theft, credit card fraud, or a complete computer takeover – all of which can happen without you even knowing about it!

1. What's in Your Inbox? – If your e-mail program allows you to preview the entire message before or while it is being downloaded, turn this setting off. Some e-mails can contain dangerous code that could unknowingly compromise your computer and leave you vulnerable to viruses, worms or worse! Check the options in your e-mail program for a way to disable the message preview pane.

2. Scrutinize Your Messages – Don't ever respond to messages claiming to be from your bank, credit card company, or other financial institution, which ask for personally identifiable information such as card or account numbers, passwords, or other private information – even if the e-mail looks to have come from the actual company. It may be a hoax designed to get you to unknowingly part with crucial financial or private contact information, leaving you vulnerable to credit card fraud, identity theft or credit card theft. Contact the institution or company that claims to be sending the e-mail and verify the contents of the message with them. Chances are – they never sent it. Only use the number on your statement though, and not the number that appears in the e-mail message. It may direct you right to the scammer, who will do everything they can to assure you that nothing is wrong!

3. If it's From a Friend, it must be Safe, Right? – It's logical to assume that a message from your friend or colleague is safe, but that isn't always the case! If you receive an email from a friend or colleague which contains an attachment (could be a media clip, a screensaver, a picture or anything else), call them up to check and see if they really did send it. Many viruses and worms can hijack your computer and blast out a virus-ridden email to everyone in your address book, making it appear that it came from you and therefore, making it appear trustworthy.

4. Read Your Messages in Plain Text – Some e-mails written in HTML (the coding language that makes up many web pages) can be harmless. Others can contain malicious code that can hijack your e-mail program, browser, or your entire computer – and send your personal and financial information out to a hacker or scammer without you even knowing about it! Stay safe by setting your e-mail program to only show messages in plain text format (often in the options or settings section of the software). This will prevent threatening code from installing itself and compromising your system and private information.

Possibly one of the best ways to protect your e-mail is simply by exercising common sense. The Internet is a lot like a crowded plaza. Would your banker or credit card lender walk out into the middle of the throng of people and shout out to you to ask for your account information? Would you tell him where everyone could hear? Definitely not! The same caution should be exercised when checking your e-mail. These tips can help you stop scammers dead in their tracks while keeping you from becoming another victim of fraud or theft.
 
 
About the Author
This article provided courtesy of http://www.wifi-shoppers-guide.com

Article Source: http://www.simplysearch4it.com/article/7978.html
 
If you wish to add the above article to your website or newsletters then please include the "Article Source: http://www.simplysearch4it.com/article/7978.html" as shown above and make it hyperlinked.



  Some other articles by Tim Henry
Paying For A College Education The Army Way
The United States Army is one of the most organizations in the country at not only promoting higher education for its members and recruits, but in assisting them to pay for it as well. They ...

Continuing Education Online
All you need to get started in continuing education online is a computer with Internet access and an appetite to learn. Once ...

Changing Your Diet, Facts You Should Know
To say that Americans are obsessed with dieting is an understatement! Pick up any magazine, tune-in or turn-on any source of advertising and you're bombarded with the latest diet ...

Baby Clothes You Can Use All Year
Few things seem more important at a baby shower than duckies, monkeys and theme colors. Once you get the baby home though, the most important thing about ...

Housebreaking Your Dog
Dogs are creatures of habit; and once they develop a habit, breaking it can be a long, frustrating process. Your dog needs guidance and ...

Are You Prepared For A Hard Drive Crash?
Its just a matter of time before you experience a hard drive problem. Are you prepared to loose your data? If your hard drive crashed right now do you have an ...

  
  Recent Articles
Microsoft Word. The power is under the hood
by Robert Duval

How To Select The Best Gaming Laptops
by Tim Childree

How To Select The Best Business Laptops
by Tim Childree

High-Tech Computer Rental for Business Promotion
by Michael Braganza

Managing a Worldwide Print Infrastructure from a Single Workstation in a Central Location
by Rick Ferguson

A Sneak Peek Into The World Of Refurbished Laptops
by Javier Fuller

Battery information
by goodbattery

Tell Me About Computers
by Khal Nuwar

Setting Up Your Own Internet Radio Station
by Jason Cole

Understanding Solar Energy
by Anna Stone

Mac FAXstf X Pro Faxing Program for Mac OS X Users
by Nivea David

How to Retrofit a Picture or an Image into Desktop Wallpaper for Your Computer
by Steve Dimeck

Can't connect to database