Email Spam Scams [Video]

Email Spam

Unwanted commercial email – also known as “spam” – can be annoying. Worse, it can include bogus offers that could cost you time and money. Take steps to limit the amount of spam you get, and treat spam offers the same way you would treat an uninvited telemarketing sales call. Don’t believe promises from strangers. Learn to recognize the most common online scams.

How Can I Reduce the Amount of Spam I Get?

Use an email filter.

Check your email account to see if it provides a tool to filter out potential spam or to channel spam into a bulk email folder. You might want to consider these options when you’re choosing which Internet Service Provider (ISP) or email service to use.

Limit your exposure.

You might decide to use two email addresses — one for personal messages and one for shopping, newsletters, chat rooms, coupons and other services. You also might consider using a disposable email address service that forwards messages to your permanent account. If one of the disposable addresses begins to receive spam, you can shut it off without affecting your permanent address.

Also, try not to display your email address in public. That includes on blog posts, in chat rooms, on social networking sites, or in online membership directories. Spammers use the web to harvest email addresses.

Check privacy policies and uncheck boxes.

Check the privacy policy before you submit your email address to a website. See if it allows the company to sell your email to others. You might decide not to submit your email address to websites that won’t protect it.
When submitting your email address to a website, look for pre-checked boxes that sign you up for email updates from the company and its partners. Some websites allow you to opt out of receiving these mass emails.

Choose a unique email address.

Your choice of email addresses may affect the amount of spam you receive. Spammers send out millions of messages to probable name combinations at large ISPs and email services, hoping to find a valid address. Thus, a common name such as jdoe may get more spam than a more unique name like j26d0e34. Of course, there is a downside – it’s harder to remember an unusual email address.

How Can I Help Reduce Spam for Everyone?

Hackers and spammers troll the internet looking for computers that aren’t protected by up-to-date security software. When they find unprotected computers, they try to install hidden software – called malware – that allows them to control the computers remotely.

Many thousands of these computers linked together make up a “botnet ,“ a network used by spammers to send millions of emails at once. Millions of home computers are part of botnets. In fact, most spam is sent this way.

Don’t let spammers use your computer.

You can help reduce the chances that your computer will become part of a botnet:

  • Use good computer security practices and disconnect from the internet when you’re away from your computer. Hackers can’t get to your computer when it’s not connected to the internet.
  • Be cautious about opening any attachments or downloading files from emails you receive. Don’t open an email attachment — even if it looks like it’s from a friend or coworker — unless you are expecting it or you know what it is. If you send an email with an attached file, include a message explaining what it is.
  • Download free software only from sites you know and trust. It can be appealing to download free software – like games, file-sharing programs, and customized toolbars. But remember that free software programs may contain malware.

Detect and get rid of malware.

It can be difficult to tell if a spammer has installed malware on your computer, but there are some warning signs:

  • Your friends may tell you about weird email messages they’ve received from you.
  • Your computer may operate more slowly or sluggishly.
  • You may find email messages in your sent folder that you didn’t send.

If your computer has been hacked or infected by a virus, disconnect from the internet right away. Then take steps to remove malware.

Report Spam

Forward unwanted or deceptive messages to:

  • the Federal Trade Commission at Be sure to include the complete spam email.
  • your email provider. At the top of the message, state that you’re complaining about being spammed. Some email services have buttons that allow you to mark messages as junk mail or report them spam.
  • the sender’s email provider, if you can tell who it is. Most web mail providers and ISPs want to cut off spammers who abuse their system. Again, make sure to include the entire spam email and say that you’re complaining about spam.

If you try to unsubscribe from an email list and your request is not honored, file a complaint with the FTC.

…read more

Source: Consumer FTC

Scam emails

<p1″>Help disrupt fraudsters by reporting scam emails that you receive. People receiving scam emails are urged to report them.

The reports received by Action Fraud will be forwarded to the National Fraud Intelligence Bureau run by the City of London Police for collation and analysis. This will enable crucial intelligence to be gathered and preventative action to be taken. The activity will seek to disrupt the fraudsters and close down the links between them and the victim.

Last year (January 2015 – December 2015) we received on average 8,000 reports per month, with 96,699 people reporting that they had received a phishing scam.

What should you do if you’ve received a scam email?

  • Do not click on any links in the scam email.
  • Do not reply to the email or contact the senders in any way.
  • If you have clicked on a link in the email, do not supply any information on the website that may open.
  • Do not open any attachments that arrive with the email.

If you think you may have compromised the safety of your bank details and/or have lost money due to fraudulent misuse of your cards, you should immediately contact your bank.

If you’ve been a victim of fraud, report it to Action Fraud.

Fake emails often (but not always) display some of the following characteristics:

  • The sender’s email address doesn’t tally with the trusted organisation’s website address.
  • The email is sent from a completely different address or a free web mail address.
  • The email does not use your proper name, but uses a non-specific greeting like “dear customer”.
  • A sense of urgency; for example the threat that unless you act immediately your account may be closed.
  • A prominent website link. These can be forged or seem very similar to the proper address, but even a single character’s difference means a different website.
  • A request for personal information such as user name, password or bank details.
  • The email contains spelling and grammatical errors.
  • You weren’t expecting to get an email from the company that appears to have sent it.
  • The entire text of the email is contained within an image rather than the usual text format.
  • The image contains an embedded hyperlink to a bogus site.

Report Fraud

…read more

Source: Action Fraud UK


Phishing scams are attempts by scammers to trick you into giving out personal information such as your bank account numbers, passwords and credit card numbers.

How does this scam work?

A scammer contacts you out of the blue pretending to be from a legitimate business such a bank, telephone or internet service provider. You may be contacted by email, social media, phone call, or text message.

The scammer asks you to provide or confirm your personal details. For example, the scammer may say that the bank or organisation is verifying customer records due to a technical error that wiped out customer data. Or, they may ask you to fill out a customer survey and offer a prize for participating.

Alternatively, the scammer may alert you to ‘unauthorised or suspicious activity on your account’. You might be told that a large purchase has been made in a foreign country and asked if you authorised the payment. If you reply that you didn’t, the scammer will ask you to confirm your credit card or bank details so the ‘bank’ can investigate. In some cases the scammer may already have your credit card number and ask you to confirm your identity by quoting the 3 or 4 digit security code printed on the card.

Phishing messages are designed to look genuine, and often copy the format used by the organisation the scammer is pretending to represent, including their branding and logo. They will take you to a fake website that looks like the real deal, but has a slightly different address. For example, if the legitimate site is ‘’, the scammer may use an address like ‘’.

If you provide the scammer with your details online or over the phone, they will use them to carry out fraudulent activities, such as using your credit cards and stealing your money.

Other types of phishing scams

  • Whaling and spear phishing – the scammer targets a business in an attempt to get confidential information for fraudulent purposes. To make their request appear legitimate, they use details and information specific to the business that they have obtained elsewhere.
  • Pharming – the scammer redirects you to a fake version of a legitimate website you are trying to visit. This is done by infecting your computer with malware which causes you to be redirected to the fake site, even if you type the real address or click on your bookmarked link.

Warning signs

  • You receive an email, text or phone call claiming to be from a bank, telecommunications provider or other business you regularly deal with, asking you to update or verify your details.
  • The email or text message does not address you by your proper name, and may contain typing errors and grammatical mistakes.
  • The website address does not look like the address you usually use and is requesting details the legitimate site does not normally ask for.
  • You notice new icons on your computer screen, or your computer is not as fast as it normally is.

Protect yourself

  • Do not click on any links or open attachments from emails claiming to be from your bank or another trusted organisation and asking you to update or verify your details – just press delete.
  • Do an internet search using the names or exact wording of the email or message to check for any references to a scam – many scams can be identified this way.
  • Look for the secure symbol. Secure websites can be identified by the use of ‘https:’ rather than ‘http:’ at the start of the internet address, or a closed padlock or unbroken key icon at the bottom right corner of your browser window. Legitimate websites that ask you to enter confidential information are generally encrypted to protect your details.
  • Never provide your personal, credit card or online account details if you receive a call claiming to be from your bank or any other organisation. Instead, ask for their name and contact number and make an independent check with the organisation in question before calling back.

Have you been scammed?

If you think you have provided your account details to a scammer, contact your bank or financial institution immediately.

We encourage you to report scams to the ACCC via the report a scam page. This helps us to warn people about current scams, monitor trends and disrupt scams where possible. Please include details of the scam contact you received, for example, email or screenshot.

We also provide guidance on protecting yourself from scams and where to get help.

Spread the word to your friends and family to protect them.

…read more

Source: ScamWatch AU

The “Nigerian” Email Scam

So-called “Nigerian” email scams are characterized by convincing sob stories, unfailingly polite language, and promises of a big payoff.

The Bait:

These messages are the butt of late night jokes, but people still respond to them. The people behind these messages claim to be officials, businesspeople, or the surviving spouses of former government honchos in Nigeria or another country whose money is tied up temporarily. They offer to transfer lots of money into your bank account if you will pay the fees or “taxes” they need to get their money. If you respond to the initial offer, you may receive documents that look “official.” They may even encourage you to travel to the country in question, or a neighboring country, to complete the transaction. Some fraudsters have produced trunks of dyed or stamped money to try to verify their claims.

The Catch:

The emails are from crooks trying to steal your money or your identity. Inevitably, emergencies come up, requiring more of your money and delaying the “transfer” of funds to your account. In the end, there aren’t any profits for you, and your money is gone along with the thief who stole it. According to State Department reports, people who have responded to these emails have been beaten, subjected to threats and extortion, and in some cases, murdered.

What You Can Do:

These emails can really tug at your heartstrings and appeal to your sense of altruism. Successful scam artists know exactly how to get you to give up your money. If you get an email asking you to send money to help out a stranger, delete it. Someone is up to no good, and trying to manipulate your emotions.
If you’ve lost money to one of these schemes, call your local Secret Service field office. Local field offices are listed in the Blue Pages of your telephone directory. more

Source: Consumer FTC

Thanks Consumer FTC, Action Fraud and for reading Email Spam Scams

IMAGE: Thats Nonsense These 4 email SCAMS will try and give you malware this Christmas

Your Donations Help Support Our Work

Like and Share on our Facebook page

Print Friendly, PDF & Email
Dr Don
Founder/Admin The Internet Crime Fighters Org, Admin DrDony's Reviews,, Author The Internet Users Handbook, See more
Dr Don
Dr Don
Dr Don

Latest posts by Dr Don (see all)

Tags: , , , , , , , , , , , , , , , , ,
Previous Post
Business Child Family Home Scams Fraud

Multi-Level Marketing MLM [Video]

Next Post
wannacry ransomware
Business Crime Security Home Social Media

WannaCry Ransomware Cyberattack [Video]


  1. Reply

    Understanding the Difference Between Phishing and Pharming

  2. Reply

    Sophisticated Phishing: Beware the Latest Gmail Phishing Attack

  3. Reply

    New Gmail Phishing Scam Is Very Dangerous, Here’s How To Recognize It

  4. Reply

    Top data breach trends in 2016 — Phishing, skimming rise; hacking holds ground In a year marked by massive data breaches, trends report finds skimming and phishing made waves in 2016.

  5. Reply
  6. Reply
  7. Reply

    What is Pharming and how can you prevent this Online Fraud?

  8. Reply

    Canada’s anti-spam laws are strangling our businesses, but there’s an easy way to make them work better

  9. Reply

    Netflix users, watch out for this spam email

  10. Reply

    Protect your inbox from phishing and other email attacks

  11. Reply

    Here’s Everything You Need To Know About Sketchy Emails What “phishing” is, how to identify it, and what to do if hackers trick you.

  12. Reply

    Bell breach may have exposed over 1 million new email addresses to phishing and spam An estimate suggests 60% of the leaked email addresses haven’t appeared in other data breaches before

  13. Reply


  14. Reply

    Millions of NZ dollars lost since September in global email scam

  15. Reply

    As BBB warns of email and text scams, here’s how you can protect yourself

  16. Reply

    America jails 3 Nigerian scammers 235 years Read more at:

  17. Reply

    Thousands hit by fraudulent ASIC email, as SMEs warned of an EOFY scam rush

  18. Reply

    Google says its machine learning tech now blocks 99.9% of Gmail spam and phishing messages

  19. Reply

    Inside Google’s Global Campaign to Shut Down Phishing

  20. Reply


    Top 5 Current Email Scams You Should Know About

    Spam & Scam email (Phishing)


    The “Nigerian” Email Scam

    Scam emails

    Recognizing and Avoiding Email Scams

    Email Scam Alert

    What is Phishing?

    Welcome to 10 Ways to Avoid Phishing Scams

    Have You Been Phished?

    Phishing Phishing is a method used by fraudsters to access valuable personal details, such as usernames and passwords.

    Phishing When internet fraudsters impersonate a business to trick you into giving out your personal information,

    What Is Phishing? Phishing is an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques. Phishing emails are crafted to appear as if they have been sent from a legitimate organization or known individual.

    How Can I Identify a Phishing Website or Email?

    How Phishing Works

    SPAM & PHISHING Cybercriminals have become quite savvy in their attempts to lure people in and get you to click on a link or open an attachment.

    What are phishing scams and how can I avoid them?

    What is phishing? Phishing is a fraudulent attempt, usually made through email, to steal your personal information. The best way to protect yourself from phishing is to learn how to recognize a phish.

    Phishing Phishing scams are attempts by scammers to trick you into giving out personal information such as your bank account numbers, passwords and credit card numbers.

    How to recognize phishing email messages, links, or phone calls Phishing email messages, websites, and phone calls are designed to steal money.

    What is Spam and a Phishing Scam – Definition

    Q&A: How to avoid phishing scams

    5 Countermeasures to Phishing Attacks

  21. Reply

    SCAM WARNING Beware of the fake BT email that is conning customers into handing over personal details The emails look like they are from BT but scammers use them to steal your details

  22. Reply

    Microsoft runs an Spam Fighters program, random users asked to grade email

  23. Reply

    6 Tips to Create a CAN-SPAM Compliant Marketing Campaign Never send an unsolicited email or SMS message to promote a business!

  24. Reply

    Why Won’t Macy’s Tell Me If Password Reset Email Is Legit Or Not?

  25. Reply

    Report: Email security systems are missing over 20% of risky emails

  26. Reply

    Why Phishing Season Lasts All Year for Top US Retailers No major brand is immune from cyber squatters; the more popular the company, the more look-alike domains phishers register as bait. Here are some techniques to watch out for.

  27. Reply

    Shadow Home Secretary Diane Abbott apparently caught by email phishing hoax The hoax was claimed by a prankster who has previously successfully targeted Bank of England governor Mark Carney

  28. Reply

    Phishing trip: At least 5 Florida counties baited by Russian election hack

  29. Reply
  30. Reply

    10 rules for writing emails that always get a reply Pump up your emails with 10 tricks that get responses and inspire action.

  31. Reply
  32. Reply

    Gmail: Follow these steps to Prevent from Phishing attacks Read more at:

  33. Reply
  34. Reply

    State worker bonuses were ‘effective’ bait in fake phishing scam

  35. Reply
  36. Reply

    Westpac customers hit with phishing scam Email containing claims of locked accounts attempts to get users’ details

Leave a Reply

Your email address will not be published. Required fields are marked *