Describe the Nigerian scam?.
What will be an ideal response?
?One of the most noteworthy e-mail scams was 419, or the Nigerian Scam, which originated as chain letters from Nigeria, Africa, in the 1970s and 1980s before switching to fax machines and then e-mail. Fraudsters need only access to Internet e-mail to solicit victims, thus saving the costs of international mail and phone calls. Unlike newer, more sophisticated phishing e-mail frauds, 419 messages have certain characteristic ploys and a typical writing style. For example, the sender asks for access to your bank account so that he can transfer his money to it as a way to prevent corrupt government of?cials in his homeland from con?scating it. The sender often promises to reward you ?nancially if you make a minor payment or allow access to your bank account. The messages are usually in uppercase letters and use poor grammar. Another common scam is a sender stating you have won a sweepstake and asking you to send money to claim the prize.
?
You might also like to view...
Which of the following is an operating system?
a) UNIX b) Microsoft Word c) Assembly Language d) C++
You can use the ____ statement to code both a pretest loop and a posttest loop.
A. For…Next B. While…Wend C. Next…For D. Do…Loop
Create a movie that has a JPEG image rotating in it.
What will be an ideal response?
Which type of malware exploits a vulnerability on one system and then immediately searches for another computer on the network that has the same vulnerability?
A. worm B. virus C. Trojan horse D. mass-mailer