On the Internet, anyone can be the victim of spam or scams. Some crooks are so stubborn that even the most cautious Internet users can be fooled. We must remain on our guard, always.
Here are some examples of scams attempts:
我想说 - 你是个大变态者。你有一个令人眼花缭乱的幻想！
Do not be impressed: do not answer! And if there is an attachment, do not open it!
Besides, do not open any attachment whose email seems suspicious.
Here is a non-exhaustive list of signals that should alert you when you receive a suspicious email:
- The sender is unknown to you;
- The object is amazing;
- The text is full of mistakes;
- The text invites you to click on an attachment;
- The name of the attachment is amazing;
... and here are some reflexes that you must have:
- Never respond to spam; not to give in to the offers contained therein;
- Systematically delete all unsolicited or unwanted mails;
- Do not broadcast your email address anywhere;
- Have multiple email addresses; For example: an address for official organizations, an address for friends, an address for subscriptions, etc.
- Use a good spam filter;
- Do not have a blind trust in the name of the sender;
- Be wary of attachments;
- Never respond to a request for confidential information;
- Hover the mouse over the links to check the actual link address;
- In the text, pay attention to the accented characters and the quality of the language practiced by the interlocutor;
- Configure the messaging software correctly (in the security settings options, prohibit the automatic execution of ActiveX, plugins, etc ...)
- Look at the header of the email to find out, in particular, where has passed the email before reaching you.
This is an illustration with Microsoft Outlook ...
This is the message header.
For more details, I invite you to consult the links in the appendix, especially the website of ALINTO (e-mail specialist) who, in his blog called "demain la messagerie", gives some good advice to protect against spam.
Spam filters are increasingly sophisticated but can not be 100% effective because some spammers exploit the security vulnerabilities of some legitimate servers, and impersonate them. So, for example, your mail server thinks it is dealing with a legitimate server ... until it is blacklisted because of the many spam that pass through it.
Indeed, you can act easily, because the French government offers a link to a spam control organization allowing anyone to make a report.
An informed surfer is worth