A few nights ago I received an email from "2CO" asking me to update my personal data. The sender did not forget to insert a link to log in, too.
Following are the steps that I have usually taken to discover whether an email came from a rightful person/company or a swindler:
Position the mouse pointer above the link provided by the sender(PLEASE DO NOT CLICK IT!). See on the status bar whether the URL that appears is genuine.
If you use Outlook Express, in the message list, select the suspected message. click "File", and then click "Properties". Click "Details" to see the email headers.
Notice the "Return-path" part, where you will see the sender's original email address. Notice the domain name (e.g ...@xyzdomain.com). Now you can guess with more confidence that it is a real or fake email.
If you have ever received an email from an autoresponder, you might have noticed that the "Return-path" part contained the domain name of the autoresponder (e.g. ....@abc.getresponse.com) although the email address looked like from another domain.
If you are still not sure, do the same with the original email which you had received previously (the one from the right person/company) for comparison. If the header of the original email on the "Return-path" part reads "Return-path: ", while on the suspected email the reading is "Return-path: ", you ought to be suspicious that the second is a fake email!
If you want, you can also notice other parts of the header such as "Received-from" and "Message-id". But, please do not be influenced by the "from" part. It is the part that is usually used to manipulate you.
Additionally, please conceive that an organitation which is always cautious about malicious abuses, such as 2CO, ClickBank, etc, will hardly send a link to you to click in the email. As I have experienced personally, if the company has something to inform me, they merely ask me to log-in to my account (There is no link to click).
Dispatching a faked up email can be done very easily by anyone who possesses a little knowledge about programming (php, etc).
I hope this tip will be useful for you.
Heris Yunora
http://www.soft-promotion.com
The Internet is a vast International Network of people and... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
You can detect spyware online using free spyware cleaners and... Read More
The trash folder in my main inbox hit 4000 today.... Read More
The money being spent online is steadily growing. With billions... Read More
A couple of days ago, I was searching for a... Read More
During the release of a new software product specialized to... Read More
If you are wondering how to fight spyware for safe... Read More
Well, if that would have been said to me by... Read More
At this point, if you've got the whole "turning the... Read More
Millions of people make purchases online, but many people are... Read More
Let us take the example of scrambling an egg. First,... Read More
Have you ever got an email asking you to confirm... Read More
As the number of people using the Internet as an... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Over £5 billion pounds was spent on online shopping in... Read More
The Threat10 years ago you could probably have run no... Read More
Viruses are, however, not the only malicious software programs out... Read More
P C. owners are constantly at risk from attacks by... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
I am the victim of an internet scam. It is... Read More
There has not been a time in the history of... Read More
If you constantly deal with bank or electronic accounts, it... Read More
A week or so ago, I received an inquiry from... Read More
So called phishers try to catch the information about the... Read More
Spyware is the most troublesome software to appear on the... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
It's late. You've been scouring the web for that perfect... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
Spyware and adware are becoming major problems for online surfers... Read More
If you are a parent, as am I, I think... Read More
Someone recently told me, "You would have to be a... Read More
If you are a parent, you have probably wondered at... Read More
This really chapped my lips...I recently bought a new computer.... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
Have been an Internet user for more than 9 years,... Read More
If spyware were a person and he set himself up... Read More
First the basic definition of Spyware: It is a type... Read More
We all know that it's dangerous to use the same... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Your computer is as slow as molasses. Your mouse freezes... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
First I would like to stress I am condoning the... Read More
Spyware is the most troublesome software to appear on the... Read More
It has been said that with the wealth of information,... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
Ebay is a great site and is used by many... Read More
Viruses are, however, not the only malicious software programs out... Read More
Over the past few years as the internet has become... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
You can detect spyware online using free spyware cleaners and... Read More
The top five online scams on the Internet hit nearly... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
By browsing a web page, you could infect your computer... Read More
Imagine this ? you open up your email box and... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Before you enter your name, address or any other data... Read More
If you are a parent, as am I, I think... Read More
Today,on most internet user's computers, we have the ability to... Read More
There are ways to insure security though. You can get... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Internet Security |