Welcome and happy reading!

Since, like anyone else, I receive tons of scam emails and snail mail letters, I decided to present here some of these. All of these (and many more which I just delete) are scams. This means, what the senders have in mind is to racket one of us. And according to what I've seen, they do succeed quite often.

If you have similar letters in your mailbox, either disregard or play with the person knowing that you can't give him (or her) any information about:

  1. Your bank account,
  2. Your address — or any valid address if that matter,
  3. Your family, and
  4. any other information that you judge private or even intimate.

Ha! I say "Your"... even if you don't like your neighbor at all, don't give his information either. The Internet leaves tracks (hackers in the US are being caught one after another!) and you would certainly be in even bigger trouble.

In the meantime, I hope you will enjoy reading these letters as I do myself once in a while. 8-)I do not always add comments with the letters since I usually don't have time to do so, but there would often be a lot of joke to tell!

Soap Bubbles

 

Latest Scams
  • Last update: 10/31/2009

    What I like in this one is that many characters are missing on the left side. Ha! Ha! Ha! Know why?!

    Many of these emails you receive them with '> ' on the left side (often drawn as '| ' by Outlook & Co.). It very much looks like this guy is not the best of all English speaker (in Singapore they speak Chinese) and when deleting the '> ' he went a bit too far on many lines. Very funny!

     
  • Last update: 02/18/2012
    Return-Path:		<nwinyer_n_okpala11@yahoo.co.in>
    X-Original-To:		alexis@halk.m2osw.com
    Delivered-To:		alexis@halk.m2osw.com
    Received:		from mail.m2osw.com (jcolo [69.55.238.181])
    			by halk.m2osw.com (Postfix) with ESMTP id A15CF1BDE4
    			for <alexis@halk.m2osw.com>; Sun, 20 Jan 2008 12:12:41 -0800 (PST)
    Received:		from web8903.mail.in.yahoo.com (web8903.mail.in.yahoo.com [203.84.221.31])
    			by mail.m2osw.com (Postfix) with SMTP id 4DBD89D402E
    			for <alexis@m2osw.com>; Sun, 20 Jan 2008 12:12:40 -0800 (PST)
    Received:		(qmail 72705 invoked by uid 60001); 20 Jan 2008
     
  • Last update: 10/31/2009
    Return-Path:		<www-data@artisweb.officinaweb.it>
    X-Original-To:		alexis@halk.m2osw.com
    Delivered-To:		alexis@halk.m2osw.com
    Received:		from snap.turnwatcher.com (colo [168.150.251.50])
    			by halk.m2osw.com (Postfix) with ESMTP id 2EFDE1BDE4
    			for <alexis@halk.m2osw.com>; Tue, 23 Oct 2007 12:06:29 -0700 (PDT)
    Received:		from ulisse.officinaweb.it (unknown [151.11.58.8])
    			by snap.turnwatcher.com (Postfix) with ESMTP id 9377226AD13
    			for <alexis@m2osw.com>; Tue, 23 Oct 2007 12:06:28 -0700 (PDT)
    Received:		by ulisse.officinaweb.it (Postfix, from userid 33)
    			id 09F3919
     
  • Last update: 10/31/2009

    Hey! The IRS owes me money again! Oh! Yes! I got that same email last year. Again, wrong number. Oh! Look at the link now... http://0x7C.0xDB11D1

     
  • Last update: 11/23/2014

    This is going on and on with pretty much all the banks I ever heard of. Many with British banks now and my less global banks! It looks like the phishers are targeting smaller banks which certainly have much less money to spend on protecting their users from giving away their credentials. This scheme most certainly work. According to the numbers I have seen, 1 in 100 people will fall for it and these people lose US $800 on average. This is quite expensive!

    Notice that this one is using an account of some sort at the University of Toronto for the fake page. The URL is really bad! But still, ...

     
  • Last update: 10/31/2009

    Funny. He calls me "President/CEO". As a matter of fact, I'm. He! He!

     
  • Last update: 10/31/2009

    The following was one single email, funny, isn't it?!


    From tony smith Sat Jan 6 00:15:34 2007
    X-Apparently-To:	alexis_wilke@yahoo.com via 206.190.39.159; Sat, 06 Jan 2007 00:15:37 -0800
    X-Originating-IP:	[205.152.59.68]
    Return-Path:	
     
  • Last update: 02/18/2012
    Received:		from snap.turnwatcher.com by substitute with [XMail 1.22 ESMTP Server]
    			id <SF9C1> for <@mail.m2osw.com:alexis@halk.m2osw.com>
    			from <promotiongames@voila.fr>; Mon, 20 Nov 2006 15:17:31 -0800
    Received:		from smtp1.voila.fr (smtp1.voila.fr [193.252.22.174])
    			by snap.turnwatcher.com (Postfix) with ESMTP id AF0C526AD8B
    			for <alexis@m2osw.com>; Mon, 20 Nov 2006 15:21:59 -0800 (PST)
    Received:		from me-wanadoo.net (localhost [127.0.0.1])
    			by mwinf4001.voila.fr (SMTP Server) with ESMTP id 24D2D5800179;
    			Tue, 21 Nov 2006 00:21:51 +0100
     
  • Last update: 10/31/2009

    First time I see one like this! Look here, I tried to make a transfer of $10 million somehow. And it looks like it did not work because of some jerk intermediary or something. Or maybe it could be because I do not have $10 million... Hmmm... I'll have to ponder the question. This is complicated!

     
  • Last update: 10/31/2009

    This is a new way to send people a virus. The good thing (if I may say) is that the virus does not get directly in your mailbox. But people who follow the link thinking: wow! I received a card, certainly do see a card at the end. But it is a virus. This only affects MS-Windows (big surprise) but hey... it's still is a virus. What kind, I don't know and it really doesn't matter to me. Just watch out for yourself!

    Note that I removed the incoming email since it can very well be a legitimate email address that the virus used to email me.