Online Threats: Geotagging, Email and Phishing: [Essay Example], 659 words GradesFixer
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Online Threats: Geotagging, Email and Phishing

downloadDownload printPrint

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

Download PDF

Threats may come in many forms and this includes online threat as well. While we are using the internet, we are prone to be attacked by many viruses such as Identity theft, Trojan, Malware, Phishing and even more. Technology has advanced so much that it has made everything easy to be accessible to anything and anyone this includes privacy as well. Hackers are always looking for good opportunities to attack users. According to an online statistic, it shows that the number of social media users worldwide from 2010 to 2017 has been increased from 0.97 billion users to 2.46 billion users. It is also estimated that there would be around 2.77 billion users in 2019. These users are prone to online threats.


Many people are geotagging their daily movements on social media platforms such as Facebook, Instagram, Twitter and other platforms as well. Adding location to a post is called ‘geotagging’ and this function is not new to anyone it has been around for a few years in various platforms, when geotagging is enabled anyone would be able to know the users’ location and hackers are able to find the exact specific location by using advanced technologies. Geotagging works in the same way as tracking, it puts the user in danger of being followed. It also alerts burglars that users are not in their houses when they give out live information about their whereabouts. Also, many people do not know that geotagging info is automatically hidden inside photos taken with devices such as the iPhone and Android cameras. According to an article, geotag is embedded in an image and a bit of data providing the longitude and latitude of where the photo was taken.

Even though the location data is not visible to the casual viewer, when a photo is posted on social media, the users privacy and safety is compromised. To avoid this and keep users safe, users should allow”. By doing this, hackers would find it complicating to identify the exact location of the user, this helps to keep them safer.

Email & Phishing

Phishing is the attempt to obtain sensitive information such as usernames, passwords and credit card details for wrong intentions. It is like hackers and online thieves fishing for the personal information of others. Usually users in social media platforms post their personal information such as their full names, birthdays, education and almost everything about them that can be used to attack them by social engineers. Mostly users are attacked through emails by falling into the trap of phishing. Phishing works in two ways. Firstly, they create links to fake websites to steal login and personal information, these websites are created so similarly as the real websites that it seems too convincing to the users to be deceived.

There are a few types of emails that users have to take note of, which are malicious, hoax and spam emails. Malicious emails contain malicious attachment and user direction which contains undetected malware and redirecting users to sites hosting malware, this threat can be identified easily when an website screen has a warning screen, pop up, redirected to another page or when the page becomes blank and even when the email is sent from an unknown sender. In case a user has accidentally clicked on an malicious email they have to turn on their firewall, disconnect from the internet, stop all online activity and scan their computer using any anti-virus. Hoax email is also a fake email and the most famous ones in recent years is the Nigerian scam. This scam is originated in Nigeria. According to an online statistic, from 2015 to 2018 the number of users reported for Nigerian scam is 4423 and the amount lost were $8,611,575 in total. Usually in this type of scam Nigerian asks for the victims help by telling them sad stories to help them or any way that is so convincing for the victim to be trapped.

infoRemember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism-free

Sources and citations are provided

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

Online Threats: Geotagging, Email and Phishing. (2019, August 27). GradesFixer. Retrieved May 13, 2021, from
“Online Threats: Geotagging, Email and Phishing.” GradesFixer, 27 Aug. 2019,
Online Threats: Geotagging, Email and Phishing. [online]. Available at: <> [Accessed 13 May 2021].
Online Threats: Geotagging, Email and Phishing [Internet]. GradesFixer. 2019 Aug 27 [cited 2021 May 13]. Available from:
copy to clipboard

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.


    Attention! this essay is not unique. You can get 100% plagiarism FREE essay in 30sec

    Recieve 100% plagiarism-Free paper just for 4.99$ on email
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample

    Sorry, we cannot unicalize this essay. You can order Unique paper and our professionals Rewrite it for you



    Your essay sample has been sent.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer uses cookies. By continuing we’ll assume you board with our cookie policy.


    Haven't found the right essay?

    Get an expert to write you the one you need!


    Professional writers and researchers


    Sources and citation are provided


    3 hour delivery