Why do People Create Computer Viruses?

Why do people create computer viruses and malware

Viruses are, without doubt, the bane of the computing world. A computer virus can be described as a malicious piece of software that has been designed to self replicate and propagate while making unauthorized modifications to computers and computer systems. I have previously written an article in which I talk about the ten signs of … Read more

Best Antivirus for the year 2020?

Is Avast the best Antivirus in the world?

Avast Antivirus Review: Is this the best antivirus in the world? Looking for the best antivirus in the world? Tired of  antimalware programs that slow you down? Then, you need to read this article. Network Bees has received a large number of complaints from readers who are stuck with antivirus and antimalware programs that behave … Read more

Top 10 Security Tools: Best Security Tools

Best security tools for your network

Best Security Tools for Various Operation Systems When it comes to securing your network and system, it’s important to get the best security tools that can be found on the market today. Listed below are the top 10 security tools that you can use to secure you system; Wireshark Wireshark is an open-source packet analyzer … Read more

10 types of malware that you need to be aware of today

The most common types of malware

Various Types of Malicious Software The internet, for all its wonders, is overflowing with various types of malware, all of which aim to infect and compromise computers.   Several reasons explain the existence of these malicious pieces of software; ranging from espionage to sheer human folly and, most commonly, greed. The definition of malware The … Read more

Phishing: Here is a Phishing Example!

Here is a Phishing Example

Phishing Example

Here is a typical phishing example letter.  Phishing is one of the things that have blighted the internet over the past few years, with thousands of people across the globe losing out to cyber criminals. In any case, I received this phishing example letter in my inbox and thought I would show it here for the benefit of those who may not know what the phenomenon is. In the interest of knowledge, I shall resist the urge to tell Mrs Fung to go Fung herself. I will, in fact, lead her along with a string of lies of my own to see where she goes. So, stay tuned….

What is Phishing?

Phishing can be described as an attempt to fraudulently obtain personal information from unsuspecting individuals. It comes disguised as a worthy cause and can be used to steal credit cards, banking details and other personal information. The phishing example below is only the start of the process….

Dearest One.

Mrs. Biyu Fung Chi [email protected] via yahoo.com. Mar 14 (4 days ago)
 
 
Be careful with this message. Many people marked similar messages as phishing scams, so this might contain unsafe content.  Learn more
 
Dearest Beloved.

I know that this letter may be a very big surprise to you, I came across your email contact from my personal search and I instructed the doctor here in this hospital to help me email you and i believe that you will be honest to fulfill my final wish before I will die.

I am Mrs. Biyu Fung Chi, I am 66 years old, From China, and I am suffering from a long time cancer of the breast. From all indication my condition is really deteriorating, and my doctors have courageously advised me that I may not live beyond 3 month; this is because the cancer has reached a critical stage.

I was married to late Dr Chi Thai, gold & diamond exportation in Burkina Faso, West Africa, where we live all our Lives for Thirty-two years before he died in the year2004. But is quite unfortunately, He died after a Cardiac Arteries Operation that lasted only for four days.

Since his death I decided not to re-marry, I deposited all the sum of $5.5million dollars with a Bank in Ouagadougou- Burkina Faso, where we spend our life together in Burkina Faso.

Presently, this money is still in their custody, and the management just wrote me as the Legitimate beneficiary to come forward to receive the money after keeping it for so long or rather issue a letter of authorization to somebody to receive it on my behalf since I cannot come over as a result of my illness, or they get it confiscated.

Presently, I’m with my laptop in a hospital where I have been undergoing treatment, I have since lost my ability to do anything myself and my doctors have told me that I have only 3 month to live.

Now that I am about to end the race like this without any family members and no child, It is my last wish to see that this money is invested, but you will assure me that you will take 50% of the money and give 50% to the orphanages home in your country for my heart to rest.

I want your good humanitarian, to also use this money to fund churches, orphanages and widows around. I must let you know that this was a very hard decision, but I had to take a bold step towards this issue because I have no further option. I hope you will help see my last wishes come true.

As soon as I receive your reply I shall give you the contact of the Bank. I will also issue you a letter of authority which will prove that you are the new beneficiary of my funds, and the documents concerning the deposit. Please assure me that you will act accordingly as I stated herein. Hope to hear from you soonest. I am waiting your response.through this my Private Email address. [email protected]

PLEASE REPLY ME AGAIN WITH THE ANSWERS TO THE QUESTIONS
BELOW FOR MY CONFIRMATION:

1.Full Name:
2.Your age:
3.Sex:
4.Nationality:
5.Country of Residence:
6.Telephone Number:
7.Your marital status;
8.Your occupation;
9.Sand to me your picture;
10.You have to assured me that you will act has I have instructed you if the fund get to your account.

Yours Sick Sister in Christ,

Mrs. Biyu Fung Chi.

 

Protect Yourself

Hope the above phishing example will help you identify the menace when you encounter it. You can also share your own examples of phishing in the comments section below. Most of them are actually hilarious! If you are interested in knowing more, read our article on some of the threats that lurk across the internet and how to identify them.

Looking for a Good Antivirus? Try Panda Security

Panda is a Good Antivirus

Panda Antivirus Review: Your Hunt for a Good Antivirus Ends Here! If you are looking for a good antivirus, you won’t go wrong with Panda, which comes with protection for Android, Windows and Mac devices. [vwklhtmltables-tables id=32] [spacer height=”20px”] If you are on the hunt for a good antivirus, our advise, at Network Bees, is … Read more

Are Your Tech Skills Secure?

Are Your Tech Skills Secure?

It’s 2020. Are your technology skills up-to-date? Better yet, do you have the tech skills to keep your information safe? In today’s tech-heavy, Internet-centric world, cybersecurity is a growing issue as major corporations are getting hacked, causing untold financial damage, and even worse—their customer’s private information can be at risk. Cybersecurity is a vital part … Read more

Top Internet Security Tools 2020

internet security tips

The risk and severity of cyberattacks have increased tremendously over the last decade. Advances in technology and the adoption of a digital lifestyle have further advanced the threat of cyberattacks. Sophisticated cyberthreats such as ransomware, phishing, or IoT-based attacks are growing by the day. A lot of people have been led to believe — by … Read more