One of the cybercrime methods that we most often find is a scam. This allows the thief to find out our e-mail without asking us. We will be forced to visit a website and log in. This may not be obtained if we install email verification for authentication clearout.io.
This email scam is prepared very seriously and most likely there is a special program to produce this scam, where the scam maker only has to enter valid data (email and password) and the program will automatically create an email with the narration that has been prepared.
This prepared narrative also lists one Bitcoin address for each recipient of the e-mail as a container to receive money from extortion, if the victim is eaten by this scam. This shows the expertise of perpetrators of cybercrime in the management of Big Data that is misused for extortion.
Then if the correct password sent via email is the password that you are currently using, what can we do to anticipate losses from this?
1. Don’t use the same password on different services. From this case, of course, you have learned that the password on one platform is known, then all your accounts will be controlled by hackers.
2. Use a password manager so you don’t need to remember multiple passwords and only need to remember one master password manager program that will remember all your passwords, no matter how complicated.
To facilitate access, save your password database encrypted in the cloud so that your collection of passwords can be accessed from anywhere easily and remain safe.
3. Activate Two Factor Authentication (TFA) and One Time Password (OTP) to protect your account and digital assets.
4. Use a unique password with a combination complicated enough to complicate brute force. Never recycle the same password.
5. If you want to track your password history, save the password that was used in the notes section in the Password Manager. Thus, when someone pretends to know your password, you can find out exactly from which application he knows your password.
So, next time do not easily believe that someone is claiming that they have your data watching adult movies, unless the email includes proof of your photo watching an adult movies.