Posts Tagged ‘malware’

Old Fashioned Advice For Avoiding Spam Email

Wednesday, July 14th, 2010

If you really want to avoid unwanted email you should use OnlyMyEmail. We block over 99% without critical false positives.If you don’t respect your online identity, nobody else will and before long your in-box will rot and fall off. At least that’s what our mother told us. She also told us to eat our vegetables that we’d go blind if we forwarded email to ourselves.

We usually take what Mom says with a grain of salt.

more »

The results of your email commands – Virus/Malware

Monday, July 12th, 2010

A new variant of the Delivery Status Notification (Failure) – Virus is widely circulating that arrives with a completely random From: sender address and a subject line, such as:

From:     “” <>
Subject:      The results of your email commands

From:     “” <>
Subject:      The results of your email commands

From:       “” <>
Subject:      The results of your email commands

Regardless of the random and fictitious sender addresses,  the emails are originating from previously infected personal computers from across the globe. A few widely diverse examples include:

more »

[] Activate – Phishing Fraud

Friday, July 2nd, 2010

A new spam campaign is circulating that is spoofing “WordPress” blog subscriptions.

Emails most commonly arrive as:

Subject:      [] Activate
From: <>

Below is a screen shot of an example email:

more »

You Didn’t Enter But You Won! – Lottery Fraud

Wednesday, April 7th, 2010

Imagine how excited you’d be if you got an email notifying you that you won millions of dollars? Never mind that you never heard of this particular sweepstakes (lottery, promotional event, giveaway or whatever) and don’t remember entering. You can just let your excitement sweep all that aside. What’s important is that YOU WON and you’re going to get tons of money.

Really? People actually believe that they won a lottery they didn’t enter?

Sadly, yes.

Judging by how often we see this particular form of email fraud there’s no shortage of potential victims. As P.T. Barnum probably didn’t say: There’s a sucker born every minute.

more »

What is wrong with you people?!

Thursday, April 1st, 2010

According to a recently published Messaging Anti-Abuse Working Group (MAAWG) survey, “half of email users in North America and Western Europe have opened or accessed spam and large proportions, representing tens of millions, have taken action like clicking on links or opening attachments”. Worse yet, nearly half of those did so on purpose “to unsubscribe, out of curiosity, or out of interest in the products or services being offered.”

We have to wonder if these same people would leave the keys in their cars to find out if there are really car thieves or would by a luxury watch from a guy on a street corner?

Probably not, as they would likely see the inherent danger in the physical world. However, in a world where most financial transactions are handled electronically, inviting strangers into your computer is an equally bad idea. more »

International Conference Invitation

Wednesday, March 24th, 2010

Today we’re going to look at conference invitation fraud. This is not the most common fraud type but it still occurs often enough to deserve mention in our ongoing email fraud series.

Conference invitation fraud goes after your vanity and to a lesser extent your charitable impulses. To fall for this type of fraud you have to believe that your presence would be desired at an international conference on say, racism, or world hunger, or maybe condom use in Africa. Whatever the cause, you are invited to represent your nation or organization at the conference. All you need to do is follow up by contacting the representative listed in the email.

more »

Internet Explorer’s Zero Day Vulnerability

Thursday, January 21st, 2010

Recent tech news reports have been buzzing about a new zero-day vulnerability in the Internet Explorer (IE) browser. While this is not strictly a spam or email issue we thought it was worth mentioning because this attack vector can ultimately be used to seize control of exposed machines and turn them into zombies in some spammer’s botnet.

more »