Welcome and happy reading!

Since, like anyone else, I receive tons of scam emails and snail mail letters, I decided to present here some of these. All of these (and many more which I just delete) are scams. This means, what the senders have in mind is to racket one of us. And according to what I've seen, they do succeed quite often.

If you have similar letters in your mailbox, either disregard or play with the person knowing that you can't give him (or her) any information about:

  1. Your bank account,
  2. Your address — or any valid address if that matter,
  3. Your family, and
  4. any other information that you judge private or even intimate.

Ha! I say "Your"... even if you don't like your neighbor at all, don't give his information either. The Internet leaves tracks (hackers in the US are being caught one after another!) and you would certainly be in even bigger trouble.

In the meantime, I hope you will enjoy reading these letters as I do myself once in a while. 8-)I do not always add comments with the letters since I usually don't have time to do so, but there would often be a lot of joke to tell!

Soap Bubbles

 

Latest Scams
  • Last update: 10/31/2009
    Received:		from web52504.mail.yahoo.com by substitute with [XMail 1.22 ESMTP Server]
    			id <S8E97> for <contact@m2osw.com>
    			from <ooluwashino@yahoo.com>; Mon, 17 Jul 2006 19:15:17 -0700
    Received:		(qmail 38786 invoked by uid 60001); 18 Jul 2006 02:16:11 -0000
    DomainKey-Signature:	a=rsa-sha1; q=dns; c=nofws; s=s1024; d=yahoo.com;
    			h=Message-ID:Received:Date:From:Subject:To:MIME-Version:Content-Type:Content-Transfer-Encoding;
    			b=EwvjfpWnLTiLNwNMzzkwS6glPMSGdOhEH4HNen8u0FCCh+vHuuf/Shr082CYwuWCIAJdD4WoKF
    			aMT8a/27Sz9op+bl1er+64mJBVxdXV1wdZt1CWRpNdfOPUd+JKWQKQGN5LG6W
     
  • Last update: 10/31/2009
    X-Apparently-To:		alexis_wilke@yahoo.com via 66.218.93.101; Wed, 11 Feb 2004 07:24:36 -0800
    X-YahooFilteredBulk:		66.35.250.206
    Return-Path:			<guobadia_omon45@bigpond.com>
    Received:			from 66.35.250.206 (EHLO mail.sourceforge.net) (66.35.250.206)
    				by mta153.mail.scd.yahoo.com with SMTP; Wed, 11 Feb 2004 07:24:36 -0800
    Received:			from mta08bw.bigpond.com ([144.135.24.137])
    				by sc8-sf-mx2.sourceforge.net
    				with esmtp (Exim 4.30) id 1AqwCq-0008Vd-9c; Wed, 11 Feb 2004 07:23:16 -0800
    Received:			from email.bigpond.com ([172.26.102.148])
    				by mta08bw.email.bigpond.com (iPlane
     
  • Last update: 10/31/2009

    The following is a scam trying to get your credentials to illegally access your Paypal account.

     
  • Last update: 10/31/2009

    This is an interesting one, I think. This email tells you that this 'wrong' email address that YOU just defined was accepted and will be used in 3 days as the official one. Of course, if you have a PayPal account you probably want to rectify and give away your password... That's the trick here. Notice that the link goes through Google which obviously would not accept PayPal just like that, especially without mentioning it.

     
  • Last update: 10/31/2009

    Interesting... They have to pay me my approved 2.5 million interest on what?! Did they borrow money from me and I don't remember???

     
  • Last update: 10/31/2009

    I like the title of this one. Outstanding payment... as in Incredible?

    Otherwise, there is the usual problems: Mr Mike Peter, Mike Peters, Willis, IMF Office Benin 02, Dr Robert Water, Mr Rodrigo de Rato Figaredo. Who am I talking with already?!

    Also note that this person found my name in the Central Computer. He! He! He! "The Internet Central Computer"?

     
  • Last update: 10/31/2009

    Another good one. Gold at my door in a few days. Well, I mean a box full of cash. I wonder why that guy couldn't just do it all himself... Hmmm...

     
  • Last update: 10/31/2009

     
  • Last update: 03/06/2018

    Not too sure what people can do with an access to NetSpend since as far as I can tell, they would not transfer money from your NetSpend account to someone "random". But maybe the person can enter oneself as a company which is to be paid some money and just send a check... which means we'll know his/her address. And if it's overseas, it's quite unlikely that it will work. The other thing would be identity theft... Anyway, hopefully they don't show the SSN of their users anywhere!


    Received:		from snap.turnwatcher.com
    			by substitute with [XMail 1.22 ESMTP ...
     
  • Last update: 10/31/2009
    From princess pauline Tue Jan 8 13:31:01 2008
    X-Apparently-To:	alexis_wilke@yahoo.com via 206.190.38.194; Tue, 08 Jan 2008 13:34:56 -0800
    X-Originating-IP:	[65.54.246.88]
    Return-Path:		<princess_pauline026@hotmail.com>
    Authentication-Results:	mta243.mail.re4.yahoo.com from=hotmail.com; domainkeys=neutral (no sig)
    Received:		from 65.54.246.88 (EHLO bay0-omc1-s16.bay0.hotmail.com) (65.54.246.88)
    			by mta243.mail.re4.yahoo.com with SMTP; Tue, 08 Jan 2008 13:34:55 -0800
    Received:		from BAY120-W3 ([207.46.9.166]) by bay0-omc1-s16.bay0.hotmail.com
    			with Microsoft SMTPSVC(6.0.3790.39