A few nights ago I received an email from "2CO" asking me to update my personal data. The sender did not forget to insert a link to log in, too.
Following are the steps that I have usually taken to discover whether an email came from a rightful person/company or a swindler:
Position the mouse pointer above the link provided by the sender(PLEASE DO NOT CLICK IT!). See on the status bar whether the URL that appears is genuine.
If you use Outlook Express, in the message list, select the suspected message. click "File", and then click "Properties". Click "Details" to see the email headers.
Notice the "Return-path" part, where you will see the sender's original email address. Notice the domain name (e.g ...@xyzdomain.com). Now you can guess with more confidence that it is a real or fake email.
If you have ever received an email from an autoresponder, you might have noticed that the "Return-path" part contained the domain name of the autoresponder (e.g. ....@abc.getresponse.com) although the email address looked like from another domain.
If you are still not sure, do the same with the original email which you had received previously (the one from the right person/company) for comparison. If the header of the original email on the "Return-path" part reads "Return-path: ", while on the suspected email the reading is "Return-path: ", you ought to be suspicious that the second is a fake email!
If you want, you can also notice other parts of the header such as "Received-from" and "Message-id". But, please do not be influenced by the "from" part. It is the part that is usually used to manipulate you.
Additionally, please conceive that an organitation which is always cautious about malicious abuses, such as 2CO, ClickBank, etc, will hardly send a link to you to click in the email. As I have experienced personally, if the company has something to inform me, they merely ask me to log-in to my account (There is no link to click).
Dispatching a faked up email can be done very easily by anyone who possesses a little knowledge about programming (php, etc).
I hope this tip will be useful for you.
Heris Yunora
http://www.soft-promotion.com
![]() |
|
![]() |
|
![]() |
|
![]() |
Have you ever bought a product or service from the... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
During the release of a new software product specialized to... Read More
A little bit of time invested into learning about internet... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
Since its birth, the Internet has grown and expanded to... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
First of all we need to get some terms stated.... Read More
Long gone are the days that we could feel secure... Read More
This really chapped my lips...I recently bought a new computer.... Read More
If you are wondering how to fight spyware for safe... Read More
Today,on most internet user's computers, we have the ability to... Read More
In recent days, I was one of the unfortunate persons... Read More
The average computer is packed with hidden software that can... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
The words Corporate Security may conjure up images of a... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
No longer are viruses the only threat on the internet.... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Someone recently told me, "You would have to be a... Read More
Phishing is the act of some individual sending an email... Read More
There has not been a time in the history of... Read More
If you are a parent, you have probably wondered at... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Nobody wants to pay to remove spyware. At the very... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
When it comes to reporting Internet scams most of us... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
P C. owners are constantly at risk from attacks by... Read More
If you are a parent, as am I, I think... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Do you really have to know how feeds work? Not... Read More
A couple of years back, I paid my dues the... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
A couple of days ago, I was searching for a... Read More
This is not some new fangled techno-speak, it is a... Read More
In 1997, I decided after 15 years as a practicing... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Paypal is a great site and is used by many... Read More
Computer infections can be broken up into 4 main categories... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
If you run any type of Internet business, Adware and... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
You may not realize it, but as you are surfing... Read More
This is the second in a series of articles highlighting... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
If spyware were a person and he set himself up... Read More
If you constantly deal with bank or electronic accounts, it... Read More
Be careful of sites that promise to send you "instant... Read More
Whether we like it or not, we are all living... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
The first thing people think about when defending their computers... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
They're out there. Individuals trying to make a quick buck... Read More
Afraid that someone is monitoring your PC or installed a... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
Is your data secure? Think again. Securing data is unlike... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Internet Security |