A few nights ago I received an email from "2CO" asking me to update my personal data. The sender did not forget to insert a link to log in, too.
Following are the steps that I have usually taken to discover whether an email came from a rightful person/company or a swindler:
Position the mouse pointer above the link provided by the sender(PLEASE DO NOT CLICK IT!). See on the status bar whether the URL that appears is genuine.
If you use Outlook Express, in the message list, select the suspected message. click "File", and then click "Properties". Click "Details" to see the email headers.
Notice the "Return-path" part, where you will see the sender's original email address. Notice the domain name (e.g ...@xyzdomain.com). Now you can guess with more confidence that it is a real or fake email.
If you have ever received an email from an autoresponder, you might have noticed that the "Return-path" part contained the domain name of the autoresponder (e.g. ....@abc.getresponse.com) although the email address looked like from another domain.
If you are still not sure, do the same with the original email which you had received previously (the one from the right person/company) for comparison. If the header of the original email on the "Return-path" part reads "Return-path: ", while on the suspected email the reading is "Return-path: ", you ought to be suspicious that the second is a fake email!
If you want, you can also notice other parts of the header such as "Received-from" and "Message-id". But, please do not be influenced by the "from" part. It is the part that is usually used to manipulate you.
Additionally, please conceive that an organitation which is always cautious about malicious abuses, such as 2CO, ClickBank, etc, will hardly send a link to you to click in the email. As I have experienced personally, if the company has something to inform me, they merely ask me to log-in to my account (There is no link to click).
Dispatching a faked up email can be done very easily by anyone who possesses a little knowledge about programming (php, etc).
I hope this tip will be useful for you.
Heris Yunora
http://www.soft-promotion.com
Phishing is a relatively new form of online fraud that... Read More
Having a good Spyware eliminator on your computer is vital... Read More
Despite the current wave of identity theft and corporate security... Read More
Adware. Spyware. Pesky pop up ads. Internet congestion. Computer malfunctions... Read More
If you are wondering how to fight spyware for safe... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
Nobody wants to pay to remove spyware. At the very... Read More
If you know what is the 'Fishing' then it's very... Read More
Have been an Internet user for more than 9 years,... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
I got a virus the other day, Thursday I believe... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
No longer are viruses the only threat on the internet.... Read More
First I would like to stress I am condoning the... Read More
We all get the odd virus now and then, but... Read More
There are ways to insure security though. You can get... Read More
The words Corporate Security may conjure up images of a... Read More
The first thing people think about when defending their computers... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
In recent days, I was one of the unfortunate persons... Read More
This is the second in a series of articles highlighting... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
When surfing the Internet you probably take your anonymity for... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
You and I are a lot alike. We are both... Read More
The most frustrating part of having Spyware on your computer... Read More
The average computer is packed with hidden software that can... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
First I would like to stress I am condoning the... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Paypal is a great site and is used by many... Read More
File sharing on p2p is soaring despite the music and... Read More
Well, this is an article I never thought I would... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Spyware and adware are becoming major problems for online surfers... Read More
You are at your computer, checking out software on EBay.... Read More
This is not some new fangled techno-speak, it is a... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
When it comes to reporting Internet scams most of us... Read More
In 1997, I decided after 15 years as a practicing... Read More
Phishing is the act of some individual sending an email... Read More
Microsoft routinely releases new security updates, many of which are... Read More
From the "Ask Booster" column in the June 17, 2005... Read More
Computer infections can be broken up into 4 main categories... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Electronic Fraud and Identity Theft ----------------------------------- Human beings are pretty... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
|