Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk
The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person. That "person" is our spam filter that insists on sending me, the administrator, a notification when it blocks an email. It's also set to delete some other mail automatically, those would be that come from addresses that have sent me spam. So I have 4000 of these in my trash. Yippee.
The compulsion to hit the forward button is alive and well even with the plethora of information available on the web about the downside of doing just that. But I have a theory.
According to one website I visited "The rate of growth of Internet use in the United States is currently two million new Internet users per month." 2 MILLION new internet users a MONTH?? It all makes sense now. There are too many newbies out there running amok with a computer, a mouse and an internet connection clicking the forward button!
But who can blame them really? Before I learned the downside of forwarding this cyberjunk and more importantly, learned that most of it isn't even true, I was among the forwarding faithful, sending on mountains of useless information to everyone I knew as quickly as it arrived.
Perhaps it was the first thing I got that I knew wasn't true that turned on the light bulb, or perhaps it was the first thing I got that just didn't make any sense, after all, who in their right mind would believe that Bill Gates was sitting around tracking forwarded emails and would actually pay you if you "passed it on"? I may be gullible, but that one was just too hard for me to swallow.
I started to look into these warnings and threats and found that the majority of them were either not true at all, like the Bill Gates hoax, or, if they were true, they were so out of date that they were no longer relevant, like the Phenylpropanolamine Drug Warning which continues to make it's rounds almost 5 years later.
By this time, I had accumulated a vast number of contacts, friends and family that didn't bother to check and just hit that forward button.
Originally, I did the research myself upon receiving a new piece of misinformation and emailed back to the sender with my findings. Eventually I became the "go to girl" for accuracy and everyone I knew would send me the email and ask me if it was real. Flattered to be considered "the expert" among my friends I dutifully did the background work and reported back but hey, I'm a mother of 3 and work full time and as honoured as I was to be the "go to girl", it got to be tedious. That's when I started sending people links to reliable sources for them to find their own answers.
I was pleased when the "go to girl" mail slowed to a trickle as did the forwarded email from people I knew. That is until several of those 2 million new users a month were people I knew and it started all over again!
First came my husband's "Auntie" who's feelings were hurt when I asked her not to forward these messages any more with an explanation of course. She was "only trying to be helpful!" She replied. Well, of course she was, isn't that why everyone forwards these messages? To be helpful.
Then came my niece who politely asked my permission to send me a few chain letters. Being the softie that I am I agreed to a "few". This was my introduction into teen angst via email. Since I was far from teenaged when I became an internet junkie, I hadn't been exposed to the suicidal poetry and advice on being a good girlfriend end of the chain letter spectrum but soon I got more than I could handle since all her friends started adding me to their address books! (And I was expecting what?)
Finally my brother-in-law of only several days forwarded me a notice that the government would soon be taxing email on behalf of Canada Post! sigh.
It was time to make a choice - either reinstate myself as the "go to girl" again, ignore and delete and let the forwarders click away in blissful ignorance, or do my part in passing the message along that forwarding every piece of junk that comes into your in box is not cool.
Of course, never knowing when to shut up won over the other choices. Hopefully the idea will catch on and people will go the extra step and rather than just delete that hoax, do the sender a favour and reward them with some useful information that might just help reduce the clutter in everyone's inbox.
DOD Releases Path to Cyber Security Through Zero Trust Architecture Department of Defense
AVAR 2022 brings together CISOs and Security Researchers to develop a secure cyberspace - Yahoo Finance
AVAR 2022 brings together CISOs and Security Researchers to develop a secure cyberspace Yahoo Finance
Security ambassadors now have a hotline WEHOville
The cybersecurity trends organizations will soon be dealing with Help Net Security
Press Briefing by Press Secretary Karine Jean-Pierre and National Security Council Coordinator for Strategic Communications John Kirby - The White House
Press Briefing by Press Secretary Karine Jean-Pierre and National Security Council Coordinator for Strategic Communications John Kirby The White House
Cyber (Security) Monday: Five Strategies to Reduce Business Risk Security Boulevard
School Security Insights: Project Planning and Implementation SecurityInfoWatch
ThreatMapper Integrates with AWS Security Hub for Improved Security Observability - Security Boulevard
ThreatMapper Integrates with AWS Security Hub for Improved Security Observability Security Boulevard
Idaho student murders: University to have 'increased security' for final weeks of semester - Fox News
Oregon lawmakers lift security measure imposed on senator Oregon Public Broadcasting
Asst. Secretary of Defense for International Security Affairs, Dr. Celeste Wallander, Trav - Department of Defense
Asst. Secretary of Defense for International Security Affairs, Dr. Celeste Wallander, Trav Department of Defense
Symposium will examine human security News at UNG
DOE tests blockchain technology to ensure grid security, resilience in first-of-its-kind demonstration - Utility Dive
DOE tests blockchain technology to ensure grid security, resilience in first-of-its-kind demonstration Utility Dive
Xi Jinping's Costly Obsession With Security: How a Quest for Control Threatens China's Economic Growth - Foreign Affairs Magazine
Xi Jinping's Costly Obsession With Security: How a Quest for Control Threatens China's Economic Growth Foreign Affairs Magazine
What is Supply Chain Security? Check Point Software
Security and crime expert provides ‘back to the basics’ advice as crime creeps closer to college campuses - Fox News
Security and crime expert provides ‘back to the basics’ advice as crime creeps closer to college campuses Fox News
Exclusive: World Cup soccer fans stopped by security officials for wearing rainbow-colored items - CNN
Exclusive: World Cup soccer fans stopped by security officials for wearing rainbow-colored items CNN
Oxford school shooting: Whistleblowers say district failed to implement its threat assessment policy - ABC News
Oxford school shooting: Whistleblowers say district failed to implement its threat assessment policy ABC News
11/28/22 National Security and Korean News and Commentary smallwarsjournal
Building trust with reputational defense Security Magazine
Police in India's Kerala Step up Security After Clashes Over Adani Port U.S. News & World Report
Cyber security expert, economist, provide Cyber Monday tips WGN TV Chicago
Portland dispensaries highlight security protocols after Sweet Dirt break-in - NewsCenterMaine.com WCSH-WLBZ
Portland dispensaries highlight security protocols after Sweet Dirt break-in NewsCenterMaine.com WCSH-WLBZ
Australia's IRAP Assessment Recognizes Boomi To Provide Comprehensive Security Controls - Business Wire
Australia's IRAP Assessment Recognizes Boomi To Provide Comprehensive Security Controls Business Wire
Security emergency following arrest in Nuevo Laredo led to US Consulate and school closures - Mexico News Daily
Security emergency following arrest in Nuevo Laredo led to US Consulate and school closures Mexico News Daily
Far-right MK appointed Security Minister TV7 ISRAEL NEWS
Acer fixes UEFI bugs that can be used to disable Secure Boot BleepingComputer
Church Mutual® names new assistant vice president – IT chief information security officer - Business Wire
Church Mutual® names new assistant vice president – IT chief information security officer Business Wire
Drug Product Security Pharmaceutical Technology Magazine
Security cameras show gunfire and an apparent police chase, but neighbors still don't know what happened - KENS5.com
Security cameras show gunfire and an apparent police chase, but neighbors still don't know what happened KENS5.com
National Security Memorandum on Strengthening the Security and Resilience of United States Food and Agriculture - The White House
National Security Memorandum on Strengthening the Security and Resilience of United States Food and Agriculture The White House
FCC adopts bipartisan national security law co-authored by Bay Area Congresswoman Anna Eshoo - KTVU FOX 2 San Francisco
FCC adopts bipartisan national security law co-authored by Bay Area Congresswoman Anna Eshoo KTVU FOX 2 San Francisco
Special Coordinator, Briefing Security Council, Appeals for Urgent Action as Israel-Palestinian Conflict Nears Boiling Point Once Again - occupied Palestinian territory - ReliefWeb
Special Coordinator, Briefing Security Council, Appeals for Urgent Action as Israel-Palestinian Conflict Nears Boiling Point Once Again - occupied Palestinian territory ReliefWeb
CISA Applauds the Beginning of Infrastructure Security Month Declaring Infrastructure Security is National Security - CISA
CISA Applauds the Beginning of Infrastructure Security Month Declaring Infrastructure Security is National Security CISA
Boost Your Security with Europe's Leading Bug Bounty Platform The Hacker News
Democrats racing to try and secure year-long budget deal before Republicans take control of the House - Fox News
Democrats racing to try and secure year-long budget deal before Republicans take control of the House Fox News
Homeland Security Secretary Mayorkas says he's not quitting as Republicans prepare to escalate attacks against him - CNN
Homeland Security Secretary Mayorkas says he's not quitting as Republicans prepare to escalate attacks against him CNN
China Poses Increasing Threat in Military Space Race, US General Warns Washington Free Beacon
New attacks use Windows security bypass zero-day to drop malware BleepingComputer
Grayscale refuses to share proof of reserves due to 'security concerns' as shares trade at a 45% discount to bitcoin - CNBC
Grayscale refuses to share proof of reserves due to 'security concerns' as shares trade at a 45% discount to bitcoin CNBC
Galaxy Watch 5 update brings new security patch & Ball watch face Android Headlines
UN official calls on Security Council to support a 'secure, peaceful and prosperous Sahel' - UN News
Will security concerns slow down Rhode Island's speedy vote count? The Providence Journal
The Cyber Monday 2022 Security, IT, VPN, & Antivirus Deals BleepingComputer
Security Cameras Make Us Feel Safe, but Are They Worth the Invasion? The New York Times
Retailers Install Security Cameras, Steel Cables as Stores Brace for Holiday Crime Wave - Washington Free Beacon
Retailers Install Security Cameras, Steel Cables as Stores Brace for Holiday Crime Wave Washington Free Beacon
McCarthy Threatens Impeachment of Biden’s Homeland Security Chief Washington Free Beacon
Free Ways to Tackle Threats to Your Computer
Protect Your PCHaving problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet?Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either.
Phishing, Fraudulent, and Malicious Websites
Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living.
The Bad Guys Are Phishing For Your Personal Information
Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft.
IPv6 - Next Step In IP Security
IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete.
How Free Scripts Can Create Security Problems
With the Internet entering our lives in such an explosive manner, it was inevitable that Internet security issues would follow as well. While credit card frauds are an offline security problem that has been carried over to the Internet as well, spamming and phishing are uniquely Internet security hazards.
Delete Cookies: New-Age Diet or Common Sense Internet Security?
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them.
Spyware - Your Web Browser is the Culprit!
My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it.
Do You Know What your Kids Are Doing Online?
It's a sad statistic, but hundreds of unsuspecting kids are lured away from home every year by strangers they meet in online chat rooms.As frightening as this seems, it gets scarce attention in the media.
Is Your Email Private? Part 1 of 3
In a word, no - an email message has always been nothing more than a simple text message sent unencrypted to a recipient we choose. So all the email that we so blithely send all over the Internet everyday is neither private nor secure.
The Important Steps To Protect Your Kids on the Internet
Internet is the ocean of knowledge. In this ocean youwill find beautiful pearls of knowledge.
Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself
The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger.
Corporate Security for Your Home Business
The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations.
Top Five Spyware Fighting Tips
Spyware and adware are becoming major problems for onlinesurfers and PC owners. Some highly respected sources such as AOL, Earthlink and Webroot place the rate of infection at 80-90% of all computers.
Don't Become An Identity Fraud Statistic!
"You've just won a fabulous vacation or prize package! Now, if you'll kindly give me your credit card information and social security number for verification purposes, you will receive this awesome gift!"Now why would they need my credit card or social security number to send me a freebie? Can you say, "identity theft?"Although there are legitimate reasons for people to need that information, such as a purchase or job application, thieves need it to steal your life and money from you!Crime officials are reporting that this kind of theft is becoming quite common. Don't be a victim! Follow a few common-sense suggestions to avoid finding out someone else has taken over your life-along with your bank account!-Do not allow anyone to borrow your credit cards! Your best friend may be trustworthy, but her boyfriend may not be!-Don't provide personal information such as date of birth, credit card numbers, your pin number, mom's maiden name, or social security number over the telephone unless you initiate the call.
Computer Viruses - How to Remove a Computer Virus from Your Computer
Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable.
Internet Shopping - How Safe Is It?
Millions of people make purchases online, but many people are still wary. They fear the unknown and have many doubts and questions about who they are dealing with.
A New Low
A new variation of the Nigerian Scam themeThe scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them.
Web Browsing - Collected Information
You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit.
Spyware, This Time Its Personal!
First the basic definition of Spyware: It is a type of software which is installed onto your computer without your permission..
Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk
The trash folder in my main inbox hit 4000 today. Since I never throw anything out, I know that what's in there is courtesy of my email filter which is set to automatically delete anything that is forwarded from my work account from a certain person.
|home | site map|