![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk
The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. That "person" is our spam filter that insists on sending me, the administrator, a notification when it blocks an email. It's also set to delete some other mail automatically, those would be that come from addresses that have sent me spam. So I have 4000 of these in my trash. Yippee. The compulsion to hit the forward button is alive and well even with the plethora of information available on the web about the downside of doing just that. But I have a theory. According to one website I visited "The rate of growth of Internet use in the United States is currently two million new Internet users per month." 2 MILLION new internet users a MONTH?? It all makes sense now. There are too many newbies out there running amok with a computer, a mouse and an internet connection clicking the forward button! But who can blame them really? Before I learned the downside of forwarding this cyberjunk and more importantly, learned that most of it isn't even true, I was among the forwarding faithful, sending on mountains of useless information to everyone I knew as quickly as it arrived. Perhaps it was the first thing I got that I knew wasn't true that turned on the light bulb, or perhaps it was the first thing I got that just didn't make any sense, after all, who in their right mind would believe that Bill Gates was sitting around tracking forwarded emails and would actually pay you if you "passed it on"? I may be gullible, but that one was just too hard for me to swallow. I started to look into these warnings and threats and found that the majority of them were either not true at all, like the Bill Gates hoax, or, if they were true, they were so out of date that they were no longer relevant, like the Phenylpropanolamine Drug Warning which continues to make it's rounds almost 5 years later. By this time, I had accumulated a vast number of contacts, friends and family that didn't bother to check and just hit that forward button. Originally, I did the research myself upon receiving a new piece of misinformation and emailed back to the sender with my findings. Eventually I became the "go to girl" for accuracy and everyone I knew would send me the email and ask me if it was real. Flattered to be considered "the expert" among my friends I dutifully did the background work and reported back but hey, I'm a mother of 3 and work full time and as honoured as I was to be the "go to girl", it got to be tedious. That's when I started sending people links to reliable sources for them to find their own answers. I was pleased when the "go to girl" mail slowed to a trickle as did the forwarded email from people I knew. That is until several of those 2 million new users a month were people I knew and it started all over again! First came my husband's "Auntie" who's feelings were hurt when I asked her not to forward these messages any more with an explanation of course. She was "only trying to be helpful!" She replied. Well, of course she was, isn't that why everyone forwards these messages? To be helpful. Then came my niece who politely asked my permission to send me a few chain letters. Being the softie that I am I agreed to a "few". This was my introduction into teen angst via email. Since I was far from teenaged when I became an internet junkie, I hadn't been exposed to the suicidal poetry and advice on being a good girlfriend end of the chain letter spectrum but soon I got more than I could handle since all her friends started adding me to their address books! (And I was expecting what?) Finally my brother-in-law of only several days forwarded me a notice that the government would soon be taxing email on behalf of Canada Post! sigh. It was time to make a choice - either reinstate myself as the "go to girl" again, ignore and delete and let the forwarders click away in blissful ignorance, or do my part in passing the message along that forwarding every piece of junk that comes into your in box is not cool. Of course, never knowing when to shut up won over the other choices. Hopefully the idea will catch on and people will go the extra step and rather than just delete that hoax, do the sender a favour and reward them with some useful information that might just help reduce the clutter in everyone's inbox. Lisa Campbell
MORE RESOURCES: Ukraine Must Guarantee Its Own Security Foreign Affairs Magazine Dallas County JP judges push for more security at government offices FOX 4 News Dallas-Fort Worth AI security risks are in the spotlight—but hackers say models are still alarmingly easy to attack Fortune Top Social Security official exits after clash with Musk’s DOGE over data The Washington Post Remarks at a UN Security Council Open Debate on Practicing Multilateralism, Reforming and Improving Global Governance United States Mission to the United Nations Navy aims to expand maritime security cooperation in latest multinational Middle East exercise DefenseScoop Red Canary Named to CRN's 2025 Security 100 List PR Newswire Young people’s voices are key to securing global peace and security World Economic Forum Expect enhanced security for Jefferson Parish parades FOX 8 Local First Why dismantling the PCLOB and CSRB threatens privacy and national security Brookings Institution CT bill would reduce renters’ security deposits to 1 month’s rent, instead of 2 - Connecticut Public WISeKey Unifies AI, Blockchain, and Quantum-Resistant Security to Strengthen Digital Trust The Quantum Insider Saviynt Recognized on CRN’s 2025 Security 100 List Business Wire Introducing enQase for Quantum-Safe Security Dark Reading Exabeam Honored in CRN’s 2025 Security 100 List Business Wire Businesses Are Delaying Upgrades to Physical Security Systems– But the Cloud Can Help BizTech Magazine New York State Police to assist with security at striking correctional facilities WETM - MyTwinTiers.com CMD+CTRL Security Signs CISA Secure by Design Pledge Business Wire Seattle City Council talks security as another shooting highlights the dangers of public transit KIRO Seattle Top Social Security Official Leaves After Musk Team Seeks Data Access The New York Times A Policymaker’s Guide to China’s Technology Security Strategy Information Technology and Innovation Foundation The 20 Coolest Identity Access Management And Data Protection Companies Of 2025: The Security 100 CRN Weeks after Baltimore courthouse shooting, MD legal leaders reflect on courthouse security Maryland Daily Record Compliance Isn’t Security: Why a Checklist Won’t Stop Cyberattacks BleepingComputer Ford introduces new features to its security app to prevent theft of F-150 pickups Detroit Free Press Cloud Security Alliance Calls for Reassessment of AI Development in the Face of DeepSeek Debut T.H.E. Journal UAE Launches Next-Gen GPS-Less Navigation and Secure Flight Control to Strengthen Aviation Security Business Wire ID R&D Delivers Industry Leading Liveness Results in U.S. Homeland Security Evaluation of Remote Identity Validation Systems Business Wire Threats to international peace and security - Security Council, 9859th meeting Welcome to the United Nations Social Security Is DOGE's New Target: What You Need to Know Kiplinger's Personal Finance Man indicted on murder charges in killing of security guard at Honduran consulate in Doraville Atlanta News First G7 Foreign Ministers’ Statement on the Margins of the Munich Security Conference Department of State Members of Space Launch Delta 45 Provide Security for President Trump's Second Inauguration SpaceCoastDaily.com Inclusivity, economic woes and security challenge Syria post-Assad Voice of America VIVE 2025 roundup: Conference beefs up security; CAQH finds $20B savings opportunity Fierce healthcare Keeper Security Launches Upgraded KeeperPAM IT Security Guru Homeland Security set to move in to flood authority headquarters this fall Wilkes-Barre Citizens Voice The Just Security Podcast: What Just Happened Series, Understanding Federal Employee Rights Just Security Arkansas secretary of state touts election security, calls for changes to ballot initiative process White River Now Malan Best Security Expands Fire Watch Services to Support High-Risk Industries amid Rising Fire Safety Concerns Yahoo Finance 5 ways to improve security governance and prevent future illegal mining tragedies from happening The Conversation Indonesia CPX 2025: Check Point CEO talks up hybrid mesh security ComputerWeekly.com Zelenskyy to Vance: Ukraine wants 'security guarantees' as Trump seeks to end Ukraine-Russia war The Associated Press |
![]() |
![]() |
![]() |
RELATED ARTICLES
Technology and Techniques Used in Industrial Espionage Industrial Espionage. These methodologies are being used on a daily basis by competitors maybe even against you. Preventing Online Identity Theft Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you. Secrets On Security: A Gentle Introduction To Cryptography Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg. HackAttack P C. owners are constantly at risk from attacks by hackers. Pharming - Another New Scam Pharming is one of the latest online scams and rapidly growing threat that has been showing up on the Internet. It's a new way for criminals to try to get into your computer so they can steal your personal data. Reclaim Your PC from the Internet Spies Viruses are, however, not the only malicious software programs out there. The newest addition to the evil software family is the so called Spywares and a good anti-virus program or firewall is not enough to safeguard against these clever programs. 3 Simple Steps to Stay Safe from Spyware There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D. How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. Cybercriminals Trick: Targeted Trojan-Containing Emails Threats we ordinary Web users face online leave us no choice but learn. Haven't you noticed how many new things you learned lately? We are much better informed about malicious programs than just a year ago. Mail Forwarding - Why Would You Do It? First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic. Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each. How to Know Whether an Email is a Fake or Not A few nights ago I received an email from "2CO" asking me to update my personal data. The sender did not forget to insert a link to log in, too. Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda Fishing on the Internet has come a long way. However, we TechWeb junkies like to call it Phishing. An Open Door To Your Home Wireless Internet Network Security? This is not some new fangled techno-speak, it is a real tool to be used for the protection of your wireless internet network and LAN. African American SMBs have to realize that if your Internet connection is on 24/7 then your network, and it is a network that your computer is connected to, is at risk. Is the Internet Insecure Because of You? Long gone are the days that we could feel secure and know for certain that we had privacy. With the digital age upon us we can no longer be so sure that our privacy is secure. Phishing - Identity Theft & Credit Card Fraud What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. Wells Fargo Report Phishing Scam First off I should explain what phishing is. Phishing is basically the act of tricking a victim into divulging information. Are They Watching You Online? When surfing the Internet you probably take your anonymityfor granted, most of us do.Tapping phones, listening to confidential conversations,reading others' e-mail messages seems like something thatonly happens in spy movies to "other" people. Can I Guess Your Password? We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? But of course remembering all the different passwords can be a headache. ![]() |
home | site map |
© 2006 |