About Me

My photo

I am a knitter and crocheter and love to design when I get a chance. I am known as the crazy cat lady with 3 dogs. I am a mother to 3 of my own and step-mother to several. I am also a grandmother.

Anything Knitted and Crocheted

Welcome to my blog. I hope to blog about my knitting and crocheting as well as everyday life. The patterns that I post are original and as such there is copyright on them. When they are based on another pattern there is a link to the pattern.

My husband and I adopted a beautiful dog named Leo. He is a dachshund and absolutely adorable! we adopted him on June 23, 2010 and he has become the love of our lives.

I love to share patterns that I find along the way or to talk about some of the neatest designers that are out there today, so I love to post links to the designs or the designers.

So grab a cup a and sit and enjoy the blog.


Cora

Wednesday, August 4, 2010

Some timely information from Scambusters about your email. Their are tips to prevent things from happening.

Over the years, Scambusters has been a pioneer against spaham, including helping to highlight the growth of email spaham -- some of it just digital junk, others armed with malware or peddling bogus offers.

http://clicks.aweber.com/y/ct/?l=Muce8&m=1bp_zisVdmtWfo&b=EvFEfqIpX3bXyEEuPcZEAw

And we have provided advice on actions you can take to prevent your email address from falling into the wrong hands or cut the possibility of a hit by filtering out the spaham emails.


http://clicks.aweber.com/y/ct/?l=Muce8&m=1bp_zisVdmtWfo&b=kQ7O_VD1rnmOv5MIi1VAzg

But that's not the end of the story. Not by a mile.

You probably think of the spaham scam artists as your enemy. But did you know that you could actually be helping them with their evil trade?

You may be surprised at how easy it is for them to collect  information from a few simple things you might do without realizing you're helping them.

This is how they do it... (Note for Mac users: All of these apply to Mac users as well, except that #4 and #5 have not been problems for Mac users so far. That means this issue is for Mac users as well.)


1. Collecting Addresses from Emails You Forward


Most people forward emails. But some seem obsessed with the idea of passing on jokes, photos, sensational or bizarre stories or pleas for help.

In particular, they're just suckers for forwarding those email spaham messages that urge you to pass them on to 10 other people, to show you care, or face dire consequences.

Apart from bogging down the Internet, many of these willing forwarders don't realize they're also passing around lists of email addresses.

Just think of how many of these you've seen where the names of previous recipients are still in the body of the message, which may eventually fall into the hands of spahammers.

In some cases, spahammers actually offer prizes if you not only forward the email to your 10 buddies but also "cc" it back to them.

Of course, you don't get a prize -- the spahammer gets that: his list of addresses.

Action: We definitely advise against forwarding unnecessary stuff, especially chain letters that urge you to pass them on to others or face disaster.

But if you really must join this hoopla, delete any previous email addresses from inside the message and use the "bcc" (blind carbon copy) line for the addressees you send to.

Of course, there's no guaranteeing they'll delete your address which will now be inside the spaham email if they pass it on!

2. Online Petitions

Ever received one of those?

You're asked to "sign" a petition in a message by adding your email address, then forward it to others and sending a copy to the "organizer."

What you're doing is passing around a list that could contain hundreds or thousands of email addresses that could be nothing more than a harvest for email spaham.

Action: In the rare instance the petition is legitimate, it has little or no value and no legal status. If it's a scam,
you will have passed it back to the "organizer" who's merely after those addresses. Just don't sign or circulate.

Here's an interesting article that explains why online petitions don't work:


http://clicks.aweber.com/y/ct/?l=Muce8&m=1bp_zisVdmtWfo&b=kQ7O_VD1rnmOv5MIi1VAzg


3. Using a Public PC

If you use a PC that's also available to others to check your email -- say in a library or at school/college, or even a friend's computer -- you usually get access to your address book online.

If so, bear these points in mind:

* The PC could be infected with a virus that is capable of harvesting addresses from browser pages, including your email service provider.
* If you fail to log out of the email service after using such a PC to check or send messages, another user has access to your account to collect addresses for spaham emails or even for identity theft.

Action: Don't use a public PC for email unless it has up-to-date anti-virus software installed, always log out of
your email service and, if you can, shut down the browser after use.

4. Your PC as a Zombie

"Zombies" are PCs that have been infected with a virus, enabling the scammer to use your computer to fire off
thousands of spaham emails without you ever knowing -- unless you know what to look for.

We covered this subject in some depth in a previous issue of Scambusters.

http://clicks.aweber.com/y/ct/?l=Muce8&m=1bp_zisVdmtWfo&b=ojXaCpvSsy5ut8oZzPB0Ew

Not only are you helping the crook to spread his email spaham to innocent victims, but you are also helping to conceal his identity by letting him use your PC -- and all for free!

Action: Heed our oft-repeated warning about opening attachments, even those that come from people you know.

Malware can also be transferred to computers if/when you use file-sharing programs (for downloading music and video, for example), or even when you insert someone's CD or USB drive into your PC.

Never do any of these things unless you have an up-to-date anti-virus program on your PC.

5. Malware Reads Your Address Book

If a scammer can get you to open an attachment or click on a link to download spyware or other viruses onto your PC, this may provide access to all sorts of confidential information, including your email address book.

The crook then has two options: either to send spaham email directly from your PC to all your contacts, or to transmit the address list back to the scammer who may then either use it or sell it to others in the email spaham business.

Action: Follow the same tips above in "Zombie" PCs.

6. Forwarding a Web-Based Message

Thousands of legitimate websites offer you the opportunity of forwarding a news story, joke or other item to someone else you think might be interested in it.

But a few of them keep that address and add it to lists they eventually sell to email scam artists.

Others exist purely for that purpose. They may forward a joke or thought for the day to your chosen recipients or they may not, but the main thing is they added you to their collection of email addresses.

Action: The only way to be 100% sure this doesn't happen is to not use this forwarding option.

Instead, copy the website address from the address bar (highlight it and copy and paste it into an email that you send out yourself).

7. Passing Your Own Mail List to Others

If you organize an event or operate a website that collects attendees' or users' email addresses, you have a valuable asset that some people are prepared to steal.

Hardly a day passes when we don't read about a list server being attacked by hackers, and hundreds or thousands of email addresses stolen.

But even a hand-written list of conference attendees has value, especially as it will contain details of people who all share a particular interest in whatever subject the event covers.

Action: Keep written lists constantly supervised. Online, you may be limited by who owns the server you use. Impose your own security where possible and choose server owners who use encrypted address storage.

You can avoid most of the address-stealing techniques outlined in this issue simply by using up-to-date anti-virus software and taking a couple of sensible precautions before forwarding messages.

Do this and you'll be playing your part in slowing the insidious spread of email spaham.

That's all we have for today, but we'll be back next week with another issue. See you then!


Cora




Creative Commons License
This work by Cora Shaw is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 2.5 Canada License.
Bookmark and Share

No comments:

Post a Comment

If you have any questions or concerns please direct them to craftygal1965{at}gmail.com. Any other comments please leave here. Please no external links, thank you.

Thank you

Cora Shaw (formerly Levesque)