A few nights ago I received an email from "2CO" asking me to update my personal data. The sender did not forget to insert a link to log in, too.
Following are the steps that I have usually taken to discover whether an email came from a rightful person/company or a swindler:
Position the mouse pointer above the link provided by the sender(PLEASE DO NOT CLICK IT!). See on the status bar whether the URL that appears is genuine.
If you use Outlook Express, in the message list, select the suspected message. click "File", and then click "Properties". Click "Details" to see the email headers.
Notice the "Return-path" part, where you will see the sender's original email address. Notice the domain name (e.g ...@xyzdomain.com). Now you can guess with more confidence that it is a real or fake email.
If you have ever received an email from an autoresponder, you might have noticed that the "Return-path" part contained the domain name of the autoresponder (e.g. ....@abc.getresponse.com) although the email address looked like from another domain.
If you are still not sure, do the same with the original email which you had received previously (the one from the right person/company) for comparison. If the header of the original email on the "Return-path" part reads "Return-path: ", while on the suspected email the reading is "Return-path: ", you ought to be suspicious that the second is a fake email!
If you want, you can also notice other parts of the header such as "Received-from" and "Message-id". But, please do not be influenced by the "from" part. It is the part that is usually used to manipulate you.
Additionally, please conceive that an organitation which is always cautious about malicious abuses, such as 2CO, ClickBank, etc, will hardly send a link to you to click in the email. As I have experienced personally, if the company has something to inform me, they merely ask me to log-in to my account (There is no link to click).
Dispatching a faked up email can be done very easily by anyone who possesses a little knowledge about programming (php, etc).
I hope this tip will be useful for you.
Heris Yunora
http://www.soft-promotion.com
![]() |
|
![]() |
|
![]() |
|
![]() |
There are ways to insure security though. You can get... Read More
"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More
The Threat10 years ago you could probably have run no... Read More
By browsing a web page, you could infect your computer... Read More
They're out there. Individuals trying to make a quick buck... Read More
If you use emails actively in your communication, you must... Read More
You'd better learn news from media, not from emails, security... Read More
To blog or not to blog? Well, why not? Lots... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Every day millions of people go online to find information,... Read More
A week or so ago, I received an inquiry from... Read More
Airport Menace: The Wireless Peeping Tom As a network... Read More
P C. owners are constantly at risk from attacks by... Read More
The first thing people think about when defending their computers... Read More
Spyware is software that runs on a personal computer without... Read More
The trash folder in my main inbox hit 4000 today.... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
With the Internet entering our lives in such an explosive... Read More
You may not realize it, but as you are surfing... Read More
With the advent of the World Wide Web, a whole... Read More
Protect Your PCHaving problems with your pc? Do your kids,... Read More
Well, this is an article I never thought I would... Read More
There are folks out there who use their powers for... Read More
Over £5 billion pounds was spent on online shopping in... Read More
Security leaks can be a big problem for any site... Read More
Internet scams and frauds are on the rise! The quantity... Read More
Ebay is a great site and is used by many... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Fishing on the Internet has come a long way. However,... Read More
The menacing campaigns that drive the corporate spyware and adware... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
In the past I've never really paid much attention to... Read More
Afraid that someone is monitoring your PC or installed a... Read More
If you use emails actively in your communication, you must... Read More
Spyware symptoms happen when your computer gets bogged down with... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Only the top spyware removers are successful at detecting and... Read More
If you are a parent, you have probably wondered at... Read More
Well, if that would have been said to me by... Read More
Much has been said on the theory of password protection... Read More
To blog or not to blog? Well, why not? Lots... Read More
The first thing people think about when defending their computers... Read More
NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More
Recently I have received email from my bank/credit Card Company,... Read More
For many, the daily walk to the mailbox evokes mixed... Read More
Spyware protection software is the easiest way of removing spyware... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
They're out there. Individuals trying to make a quick buck... Read More
The average computer is packed with hidden software that can... Read More
Huge number of spyware software applications are available in the... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
The 1998 Data Protection Act was not an extension to,... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
If you constantly deal with bank or electronic accounts, it... Read More
So called phishers try to catch the information about the... Read More
We all get the odd virus now and then, but... Read More
On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More
If you know what is the 'Fishing' then it's very... Read More
First, let's do a little recap'. As I stated in... Read More
Internet Security |