Since, like anyone else, I receive tons of scam emails and snail mail letters, I decided to present here some of these. All of these (and many more which I just delete) are scams. This means, what the senders have in mind is to racket one of us. And according to what I've seen, they do succeed quite often.
If you have similar letters in your mailbox, either disregard or play with the person knowing that you can't give him (or her) any information about:
-
Your bank account,
-
Your address — or any valid address if that matter,
-
Your family, and
-
any other information that you judge private or even intimate.
Ha! I say "Your"... even if you don't like your neighbor at all, don't give his information either. The Internet leaves tracks (hackers in the US are being caught one after another!) and you would certainly be in even bigger trouble.
In the meantime, I hope you will enjoy reading these letters as I do myself once in a while. 8-)
I do not always add comments with the letters since I usually don't have time to do so, but there would often be a lot of joke to tell!

Latest Scams |
-
Last update: 10/31/2009
These days I got an increase of Random Content. And that's just plain...
weird. I can understand the concept of sending emails to sell things such
as Viagra and Porn, but emails which are randomly generated with content
randomly taken from websites, I don't get it.
-
Last update: 10/31/2009
X-Apparently-To: alexis_wilke@yahoo.com via 206.190.38.193; Tue, 29 Jun 2004 07:25:01 -0700
X-Originating-IP: [66.35.250.206]
Return-Path: <mustaphar@stade.fr>
Received: from 66.35.250.206 (EHLO sc8-sf-mx2.sourceforge.net) (66.35.250.206)
by mta305.mail.scd.yahoo.com with SMTP; Tue, 29 Jun 2004 07:25:01 -0700
Received: from stade.fr ([212.129.61.36] helo=mail.stade.fr) by sc8-sf-mx2.sourceforge.net
with esmtp (Exim 4.34) id 1BfJXg-00083l-2M; Tue, 29 Jun 2004 07:25:00 -0700
Received: from [192.86.103.74] (account mustaphar@stade.fr)
by mail.stade.fr (CommuniGat
-
Last update: 10/31/2009
Received: from netscape.net by substitute with [XMail 1.22 ESMTP Server]
id <S8650> for <alexis@m2osw.com>
from <reginaahmedtysecppe@netscape.net>; Thu, 29 Jun 2006 02:03:34 -0700
Received: from unknown (126.184.94.72) by smtp.mixedthings.net
with ESMTP; Thu, 29 Jun 2006 06:46:06 -0300
Received: from [131.5.197.95] by webmail.halftomorrow.com with QMQP; Thu,
29 Jun 2006 06:30:12 -0300
Received: from 208.70.169.150 ([208.70.169.150]) by mail.naihautsui.co.kr
with SMTP; Thu, 29 Jun 2006 06:26:01 -0300
Received: from unknown (148.141.143.70)
-
Last update: 11/23/2014
Quite interesting email. First the header includes some broken entries with the missing space after the : (i.e. X-EYOU-SPAMVALUE) Then the email itself sounds like the bank can only secure its login stuff with your help. I guess they could not just turn off your account and voila...
Return-Path: <security@regions.com>
X-Original-To: alexis@halk.m2osw.com
Delivered-To: alexis@halk.m2osw.com
Received: from mail.m2osw.com (jcolo [69.55.238.181])
by halk.m2osw.com (Postfix) with ESMTP id 132B31BDE4
for <alexis@halk.m2osw.com>; Thu, 14 Feb 2008 15:45:07 -0800 ...
-
Last update: 11/24/2014
The link in this one was on an artist website. The artist just has a Flash animation in there. The hacker added the directory named "onlinebanking" and put a copy of the bank's website.
http://art-altnurme.com/onlinebanking/index.html
Now it sounds like the bank did have a website without encryption before. That's most certainly the case. All banks do just that. Website with no encryption, no certificate, nothing. And all your data floats around just like in totally clear text! Yeah! Right! And sure they need us to confirm we're still alive. Say the bank has ...
-
Last update: 10/31/2009
I like the "To:" field... don't you?!
|