In 2017, Steve Burgess published a piece titled “How to Avoid Being Hacked, Part 1 – Email.” Hacking is a prevalent occurrence in today’s world; nevertheless, it is important to be aware that hacking that targets you personally due to who you are is a far less common event than hacking that just targets random people. Additionally, it is far more usual to take use of your internet data than it is to take control of your computer. The majority of individuals do not have a profound understanding of their computers or operating systems. In that regard, there is no shame. Computers are a subject that no one really comprehends in their whole. However, this makes it simpler for those individuals who are always looking for ways to make an illegal profit, whether it be through a new method they have devised to separate you from your belongings or a tool they have purchased in order to apply leverage to a section of the internet that is not protected. In addition, the digital world is always evolving, and it is far simpler for people who provide software and hardware to offer unsecure products than it is for them to spend the additional effort (and risk losing market share) to make them very secure. Therefore, it is up to us to be more mindful of our actions while we are talking on the phone, using the internet, and using the equipment that we have acquired. Particular conscious behaviors are universally applicable to mobile devices like as computers, tablets, and phones, while others are platform-specific and only apply to certain devices. Phishing via electronic mail My email from Apple asked me to validate a recent purchase that I had made. The communication made reference to the purchase. By clicking on the link, my online browser was sent to the Apple website; nevertheless, there was something that did not seem to be entirely right. After pausing for a time, I reflected on the fact that I had made a purchase from Apple the day before, but the email I received did not mention the particular item I had purchased. In addition to checking the email, I went ahead and dropped off the website. I moved my mouse over the link, and sure enough, there was no mention of apple anywhere in the link itself. Phishing emails are extremely common and are designed to trick you into visiting a website that appears to be legitimate but is actually a fake one (like the Apple website, which I thought I was on). Once you do this, the hacker will have complete access to your online account so that they can steal your personal information. In addition, the fact that many individuals use the same login and password for many online accounts makes it far easier for hackers to take control of your digital life in a short amount of time. This occurs to individuals who ought to know better, and it even came close to happening to me, who ought to know better as well! Nevertheless, how did they know that I had just purchased anything from Apple, or in other fraudulent emails – how do they know that I had purchased something on eBay, or what bank I am with? I don’t even know how they acquired my email address. The quick answer is that it is very unlikely that they do. The identical email is sent to a million potential email addresses, which may have been obtained from a list that they purchased, email addresses that they scraped online, or just randomly generated by a software (joe@abc.com, joe@def.com, joe@yourwebsite.com, etc.). The cost of sending single email is essentially nonexistent, while the cost of sending a million emails is not much higher. It is not difficult at all to include an official logo that has been snatched from a business website into an email, and it is also simple to create a website that displays an official appearance. In point of fact, it is possible to simply take the code from an official website and then replace the original links with fake ones that steal your login information. I should also mention that a link is not necessarily what it seems to be. As an instance, if I were to tell you to click on this link to winamillionbucks.com, you would discover that it would take you to a website that could help you save some money, but it will not win you a million dollars. Observing what appears when you move your mouse over a certain hyperlink, such as the one that is shown above, without clicking on it, may be an illuminating experience. Alternatively, if nothing appears, you may expose the link by right-clicking (or [ctrl]-clicking on a mouse with a single button). To avoid being caught in by anything like this, the quick solution is to avoid clicking on links that are included inside emails. In a web browser, enter in the desired page address. You might also copy the URL, put it into a text document, and check to see whether it is indeed your bank, Apple, eBay, or the place you meant to go all along. Two-factor authentication, passwords, and the distribution of the form are going to be discussed in the second half.