Email Theft Via Scam

Some email service providers install email verification for their users. This is made to prevent cybercrime cases that often occur later. In addition to data theft, e-mail can contain important data about a person, both personal data and company data. For this reason, email users are required to install at least 1 email verification. Now, we may not feel that it is very important, but know that this is very useful for us because there have been many cases of email theft that have harmed many people and even harmed the country

The Cambridge Analytica case is an expert technique in processing and utilizing data that for most people is not useful, but in the right hands, the data is proven to influence the results of the Presidential Election in the United States (US).

Similar exploits have occurred in email spam the past two weeks. Expertise using data that for most people is not useful, it turns out to cause panic in many recipients of the email, even though the email users are users who are quite proficient.

If you use a qualified email server service such as Gmail, this scam has likely been detected and stopped before entering your inbox. However, if the scam is successfully entered, the contents are guaranteed to at least surprise the recipient, because the ‘keywords’ that you have kept secret and use, including secret activities, are already known to the sender of the scam.

The greatness of a scam is its ability to send a scam that is unique and only suitable for email addresses that receive a scam. Certainly, this scam is sent in massive numbers and remains unique.

Where is the uniqueness? The uniqueness is the pair of e-mails and passwords that are by the reality where the password is indeed used by the e-mail owner.

If the data is inaccurate and the password claimed to be known by the scam spreader does not match the password used by the recipient of the email, then the shock effect will not be large and the victim will not be surprised or stunned like a buffalo matched by the nose following the command of the scam maker.