pastercal.blogg.se

Install virus on your own cell phone to infect any hackers
Install virus on your own cell phone to infect any hackers












install virus on your own cell phone to infect any hackers
  1. #Install virus on your own cell phone to infect any hackers install#
  2. #Install virus on your own cell phone to infect any hackers full#

The most common of these have ZIP or RAR extensions.

install virus on your own cell phone to infect any hackers

Compressed Files:Ĭertain compressed files are also not safe to open.

#Install virus on your own cell phone to infect any hackers install#

If you are on a Mac computer, you also want to watch out for DMG files, which can also be used to install malware on your computer. If you open this type of file on your computer, it will almost certainly contain malicious software (also known as malware). One of the most dangerous types of files that hackers attach to emails is an executable file. (Image Source: Microsoft) Executable Files: However, Microsoft warns you not to do so “unless you’re certain that you know exactly what that active content does.” So, in order to be able to edit the document, you will have to activate the macro manually by clicking the Enable Content button at the top of your screen. The macro will not be activated automatically unless it is from a trusted location. These include files with extensions like DOC, DOCX, XLS, and PPT. Microsoft Office documents can contain “macro” viruses, which are hard to detect because they are written in the same language as programs like Word, Excel, and PowerPoint. So, you should only open an attachment if you know who it is from, and you were already expecting the attachment. However, it is important to note that, even if an image looks safe, it could be another type of file in disguise. These include files with common extensions such as JPG, PNG, GIF, MOV, MP4, MPEG, MP3, and WAV.

#Install virus on your own cell phone to infect any hackers full#

So, before you open an email attachment, you should always check the sender’s full email address before opening an attachment.įor example, if you get an email from Amazon, the returns email address should end with If the email address doesn’t match the sender’s name, or it looks suspicious at all, you should not open the attachment.Įmail attachments that contain images, videos, and audio files are generally considered to be the safest to open. Hackers have the ability to “spoof” (or fake) an email address to make it look like it’s from your boss, a family member, or even a major company like Apple or Microsoft. To protect yourself from malicious email attachments, the Federal Bureau of Investigation (FBI) warns you to “never open an email attachment from someone you don’t know.” The agency also advises you to “carefully examine the email address” before opening an attachment. Only Open Email Attachments from Trusted Sources This is because most viruses require you to take some sort of action (like opening an attachment or clicking on a link) in order to infect your computer these days. Unless you are using very old software, you won’t get a virus just by opening an email anymore.














Install virus on your own cell phone to infect any hackers