This BLOG is sponsored
by “Misty Hollow
Carving”.
You are welcome to visit Misty Hollow and see all of my carvings.
My Web Site is a like a
Gallery – please drop in for a stroll through.
To help me promote my
Web Site please copy this URL address and email to someone today http://www.murraylincoln.com/
* * * * * * * *
Today’s Blog Post
Wow I can get rich – I have a boat load of money coming
soon!
The email reads as follows…
quote…
“We have made a digital
funds transfer to Acct Id: murray.lincoln@gmail.com.
Accept your transfer here:
http://newslettermessages.com/ cgi-bin/arp3/arp3-t.pl?l=143& c=2106860
Regards,
Payment Center”
funds transfer to Acct Id: murray.lincoln@gmail.com.
Accept your transfer here:
http://newslettermessages.com/
Regards,
Payment Center”
End quote
It was so tempting to click on to the
Link that is offered in the email. But
doing so would possibly open me to a whole world of being stung over and over
again.
This is definitely part of the scams
that are now circulating regularly over the Internet. My Gmail account had caught the scam and the
computers on their end had placed it in my Spam Folder of my email account. I can check it out before I delete it – just in
case I want to go further with it.
Gmail People has a way of recognizing
that this is a potential scam and that someone is trying to get me into
trouble.
How can it get to my email?
I am involved with a number of
On-Line groups where discussions of different topics take place. One group is a
minister’s group and another is a Tatting Lace making group. These groups are closed to outsiders and you
can only be a part of the group if you sign up for the account for each group. To
do this you must register your email with each group and then manufacture a
Password that is used when you sign in to the account.
Each group has a certain security level
that is strictly enforced. If the security is breached and/or a culprit can get
into the group they will then have access to all the emails that the individual
has connected to in their group. But the
emails that come from the Group Members are not of people in the group – they are
from all the people that each group member connects with… and if they are in
other groups the culprit now will “get inside” of yet another group.
What would they ever want to do that
for? Well they seemed to get their kicks
out of getting more and more email addresses collected to send more and more –
to get more and more.
When the email addresses are collected
they can be sold to people who want to advertise and contact more people for
their product.
I run a small business. As some of you
know Misty Hollow Carving started in 2008 and has been growing. I have a Web Site
advertised at the beginning of this blog. My dream is to have as many people as
possible to see my product and possibly become a “customer”. To get the people to see what I make – I can
wait until they discover me by clicking on to my site.
But there is a faster way. I can click
on to certain company’s Web Sites and for a small price I can have my product
transported via emails to people that I have no idea about – BECAUSE their
company has access to millions of people that I do not. AND IT IS VERY LIKELY that these email
addresses were caught in a “phishing” process.
Think of the fact that you are a bit
of a “fish” to these people. If they can attract you to their bait and by way
of their bait you will possibly bite, be caught and produce for them a
wonderful meal. That meal could be more
email addresses, more possible clients for them, or maybe they will get you to
simply give your money away!
This kind of computer scam is entitled
“phishing”- where information about you is gleaned by various methods. Wikipedia states the following… quote
“Phishing is a way of attempting to acquire information
(and sometimes, indirectly, money) such as usernames, passwords, and credit card details
by masquerading as a trustworthy entity in an electronic
communication. Communications purporting to be from
popular social web sites, auction sites, online payment processors or IT
administrators are commonly used to lure the unsuspecting public. Phishing is
typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter
details at a fake website whose look
and feel are almost identical to the legitimate one. Phishing is an
example of social
engineering techniques used to deceive users, and exploits the poor usability of
current web security technologies. Attempts to deal with
the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security
measures.”
End quote
“Phishing” emails I have experienced often come from people I know. Their computer seems
to have mind of its own… or their email program does. The email will read
something like… “Wow! Take a look at this you won’t believe it…”
then it offers a link that is not quite something that I can read where or what
it is about. I trust my friend that sent
this email – so I will potentially click on to it. The screen changes and it
sends me to some silly site that has nothing to do with a “Wow” at all.
However by clicking on to it
has now included my email into its send mode. By program coding a certain way
it has now accessed my address book and gleaned many new email addresses to
send out a “Wow! Take a look at this you won’t believe it…”
to my friends... they in turn click on it because they trust me… and away we go…
on and on and on.
My Gmail folk tell me the
following… the quote from their site explaining why they put certain emails to
me into the Spam folder… quote…
“Gmail uses automated spam
detection systems to analyze patterns and predict what types of messages are
fraudulent or potentially harmful. Here are just a few of the things our system
considers when marking a message as spam:
·
* Content
that's usually associated with spam such as mature content and "get rich
quick" schemes
·
* Messages that
falsely appear to be a "bounced message" response (a system-generated
email that you might automatically get after sending a message that can't be
delivered such as a message sent to an invalid email address)
·
* Messages sent
from accounts or IP addresses that have sent other spam messages
·
* Behavior of
other Gmail users, such as many people reporting spam from a particular sender
·
* Similarity to
other spam or phishing messages based on a combination of things like subject
matter, elements like spelling and formatting, and suspicious attachments
·
* A difference
between your Gmail language preference and the
language used in the message
End quote…
All of the above is one BIG
reason that I love Gmail. They have been doing this for a long time to help
customers like me!!
I write this today to tell you
if you get a “Wow take a look at this…”
or a “You won’t believe this one!”
or something that looks weird… from my email address… don’t open it! I don’t even know your email address – unless
you are a close friend of mine.
I will not feel bad if you don’t
open something sent from my email address.
I will never know if you opened it or not. Just delete it… then let me know that my
email program has sent out a weird email… I will deal with it from there on.
Hope that helps you today. And
I hope it helps to stop stupid and harmful emails from hurting other people.
Now – mind you – if you really
want to give your money away – I will take it openly and honestly. I would like you to just click on this email
address then we can arrange where and how you can deposit the money into my
account. I can guarantee that I will spend it wisely on myself. My email address is murray.lincoln@gmail.com
~ Murray Lincoln ~
Resources:
Phishing
1 comment:
I have to thank you for the efforts you have put in
writing this blog. I am hoping to check out the same high-grade blog posts from you in the future as well.
In truth, your creative writing abilities has encouraged me to get my
own, personal website now ;)
Here is my blog post : Payday Cash Loan
Post a Comment