How to Protect yourself from the Wcry, Ransomware

How to protectect your PC from Wcry Ransomware

Malwarebytes Protects Against Wcry Ransomware If, as you should, you are worried about the marauding Wcry Ransomware, one of the ways through which you can protect yourself is through the use Malwarebytes antimalware. We have previously written an article in which we mention the fact that Malwarebytes is a good antimalware that provides all round … Read more

How to Protect your Computer from Viruses

Protect your computer from malware

Today, computers play an important role in the ways in which we, as human beings, interact with one another and with the world at large. What most of us do not realize is that the planet as we know it would be different without these machines and the internet technologies that they have engendered. Unfortunately, … Read more

Why do People Create Computer Viruses?

Why do people create computer viruses and malware

Viruses are, without doubt, the bane of the computing world. A computer virus can be described as a malicious piece of software that has been designed to self replicate and propagate while making unauthorized modifications to computers and computer systems. I have previously written an article in which I talk about the ten signs of … Read more

Best Antivirus for the year 2020?

Is Avast the best Antivirus in the world?

Avast Antivirus Review: Is this the best antivirus in the world? Looking for the best antivirus in the world? Tired of  antimalware programs that slow you down? Then, you need to read this article. Network Bees has received a large number of complaints from readers who are stuck with antivirus and antimalware programs that behave … Read more

Paying for your Antivirus? Here is why you are a sucker!

use Windows Defender

Windows Defender is why you have been had I know this will be depressing to some people, but if you have been paying for an antivirus on a Windows 10 computer over the past few years, then you are an absolute sucker. The last time that we bought an antivirus for any of our machines … Read more

Top 10 Security Tools: Best Security Tools

Best security tools for your network

Best Security Tools for Various Operation Systems When it comes to securing your network and system, it’s important to get the best security tools that can be found on the market today. Listed below are the top 10 security tools that you can use to secure you system; Wireshark Wireshark is an open-source packet analyzer … Read more

10 types of malware that you need to be aware of today

The most common types of malware

Various Types of Malicious Software The internet, for all its wonders, is overflowing with various types of malware, all of which aim to infect and compromise computers.   Several reasons explain the existence of these malicious pieces of software; ranging from espionage to sheer human folly and, most commonly, greed. The definition of malware The … Read more

How to Spot a Phishing Attempt: Tips to Identify Phishing

how to spot a phishing attempt

Identifying a Phishing Attempt I recently received an SMS from someone claiming that I had won $850,000.00 through the UK Toyota  Mobile Award, whatever that is. The message required that I send an email to a given address to begin the process of claiming my winnings. The whole thing was, of course, a charade. However, … Read more

Why Malwarebytes is a Good Antimalware

Malwarebytes is a Good Antimalware

Why Malwarebytes is the best antimalware program in the world Please note that we are affiliated with some of the companies whose products are reviewed on this blog. All our reviews are, however, based on real research by real customers. That is why we firmly believe that Malwarebytes is a good antimalware. If you have … Read more

Phishing: Here is a Phishing Example!

Here is a Phishing Example

Phishing Example

Here is a typical phishing example letter.  Phishing is one of the things that have blighted the internet over the past few years, with thousands of people across the globe losing out to cyber criminals. In any case, I received this phishing example letter in my inbox and thought I would show it here for the benefit of those who may not know what the phenomenon is. In the interest of knowledge, I shall resist the urge to tell Mrs Fung to go Fung herself. I will, in fact, lead her along with a string of lies of my own to see where she goes. So, stay tuned….

What is Phishing?

Phishing can be described as an attempt to fraudulently obtain personal information from unsuspecting individuals. It comes disguised as a worthy cause and can be used to steal credit cards, banking details and other personal information. The phishing example below is only the start of the process….

Dearest One.

Mrs. Biyu Fung Chi mrs.biyufungchi16@gmail.com via yahoo.com. Mar 14 (4 days ago)
 
 
Be careful with this message. Many people marked similar messages as phishing scams, so this might contain unsafe content.  Learn more
 
Dearest Beloved.

I know that this letter may be a very big surprise to you, I came across your email contact from my personal search and I instructed the doctor here in this hospital to help me email you and i believe that you will be honest to fulfill my final wish before I will die.

I am Mrs. Biyu Fung Chi, I am 66 years old, From China, and I am suffering from a long time cancer of the breast. From all indication my condition is really deteriorating, and my doctors have courageously advised me that I may not live beyond 3 month; this is because the cancer has reached a critical stage.

I was married to late Dr Chi Thai, gold & diamond exportation in Burkina Faso, West Africa, where we live all our Lives for Thirty-two years before he died in the year2004. But is quite unfortunately, He died after a Cardiac Arteries Operation that lasted only for four days.

Since his death I decided not to re-marry, I deposited all the sum of $5.5million dollars with a Bank in Ouagadougou- Burkina Faso, where we spend our life together in Burkina Faso.

Presently, this money is still in their custody, and the management just wrote me as the Legitimate beneficiary to come forward to receive the money after keeping it for so long or rather issue a letter of authorization to somebody to receive it on my behalf since I cannot come over as a result of my illness, or they get it confiscated.

Presently, I’m with my laptop in a hospital where I have been undergoing treatment, I have since lost my ability to do anything myself and my doctors have told me that I have only 3 month to live.

Now that I am about to end the race like this without any family members and no child, It is my last wish to see that this money is invested, but you will assure me that you will take 50% of the money and give 50% to the orphanages home in your country for my heart to rest.

I want your good humanitarian, to also use this money to fund churches, orphanages and widows around. I must let you know that this was a very hard decision, but I had to take a bold step towards this issue because I have no further option. I hope you will help see my last wishes come true.

As soon as I receive your reply I shall give you the contact of the Bank. I will also issue you a letter of authority which will prove that you are the new beneficiary of my funds, and the documents concerning the deposit. Please assure me that you will act accordingly as I stated herein. Hope to hear from you soonest. I am waiting your response.through this my Private Email address. mrs.biyufungchi16@gmail.com

PLEASE REPLY ME AGAIN WITH THE ANSWERS TO THE QUESTIONS
BELOW FOR MY CONFIRMATION:

1.Full Name:
2.Your age:
3.Sex:
4.Nationality:
5.Country of Residence:
6.Telephone Number:
7.Your marital status;
8.Your occupation;
9.Sand to me your picture;
10.You have to assured me that you will act has I have instructed you if the fund get to your account.

Yours Sick Sister in Christ,

Mrs. Biyu Fung Chi.

 

Protect Yourself

Hope the above phishing example will help you identify the menace when you encounter it. You can also share your own examples of phishing in the comments section below. Most of them are actually hilarious! If you are interested in knowing more, read our article on some of the threats that lurk across the internet and how to identify them.