{"id":9427,"date":"2015-04-30T06:15:12","date_gmt":"2015-04-30T10:15:12","guid":{"rendered":"http:\/\/thundercloud.net\/infoave\/new\/?p=9427"},"modified":"2015-04-30T06:15:12","modified_gmt":"2015-04-30T10:15:12","slug":"45-of-all-users-cannot-tell-a-scam-email-from-a-safe-one-can-you","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/45-of-all-users-cannot-tell-a-scam-email-from-a-safe-one-can-you\/","title":{"rendered":"45% Of All Users Cannot Tell a Scam Email From a Safe One. Can You?"},"content":{"rendered":"<p><strong>About this article&#8230;<\/strong><\/p>\n<p>Again, with permission of our friends at Emsisoft, we&#8217;re featuring this article about email safety and how you can tell spam and scams from safe email. Don&#8217;t scoff and think you know how to tell &#8211; it&#8217;s not as easy as it use to be. Scammers and spammers have honed their skills and now nearly half of all computer users (45%) are fooled by spam and scam emails. We \u00a0have covered this subject in our newsletters many times, but Emsisoft does an excellent job of covering some of the spam and scams you&#8217;re most likely to encounter, and help you tell a good email from a malicious one.<\/p>\n<p><em>Note: We agree with almost all of this article, we don&#8217;t agree with the idea of installing MailWasher. We have found MailWasher too aggressive and too slow; it is just as likely to throw the baby out with the bathwater as it is to protect you from nefarious emails. We don&#8217;t recommend or endorse MailWasher.<\/em><\/p>\n<p><span style=\"text-decoration: underline;\"><a href=\"http:\/\/thundercloud.net\/emsisoft\/\" target=\"_blank\">We do recommend and endorse Emsisoft<\/a> <\/span>because we have, by now, seen it in action on hundreds of computers and we know that Emsisoft can help protect you from the threats you&#8217;re most likely to encounter every time you&#8217;re online. <a href=\"http:\/\/thundercloud.net\/emsisoft\/\"><strong><span style=\"text-decoration: underline;\">You can learn more about Emsisoft Anti-Malware (and antivirus) here<\/span><\/strong>.<\/a><\/p>\n<header>\n<h1 class=\"entry-title\">How to recognize the difference between a safe email and a scam<\/h1>\n<\/header>\n<section>\n<div class=\"entry-content\">\n<div id=\"content\" class=\"wp-single-style\">\n<p><a href=\"http:\/\/blog.emsisoft.com\/2015\/04\/30\/how-to-recognize-the-difference-between-a-safe-email-and-a-scam\/?ref=ticker150429&amp;utm_source=newsletter&amp;utm_medium=newsletter&amp;utm_content=blog&amp;utm_campaign=ticker150429\">From Emsisoft&#8217;s Blog<\/a><\/p>\n<blockquote><p>Over one billion consumers send and receive email\u00a0on a daily basis. Of those, eighty thousand\u00a0are victimized by scams everyday and a total of four million people\u00a0fall prey to scams annually. It is essential for everyone to learn to differentiate a safe email from a potential scam because carelessly opening attachments and messages may leave you facing the aftermath of financial loss and identity theft.<\/p>\n<h3>45% of users are fooled by email\u00a0scams and face financial loss or identity theft<\/h3>\n<p>According to <a href=\"http:\/\/www.scamdex.com\/\" target=\"_blank\">Scamdex<\/a>, these\u00a0are the top five types of\u00a0email\u00a0scams that you need to watch out for:<\/p>\n<p><strong>#1)\u00a0Employment scams \u2013 fake job offers (work from home)<br \/>\n<\/strong><\/p>\n<p>These types of scams typically target people looking for or changing jobs. The\u00a0majority of the employment opportunities on the internet are work from home jobs\u00a0that\u00a0promise a large sum of income for a small amount of work.\u00a0Many employment offers as these are a form of check fraud which means scammers will illegally use a victim\u2019s\u00a0checks to borrow funds that do not exist within the account. You can often recognize these type of scams by the use\u00a0of pictures with money or cars, testimonials, payment fees, and loud text.<\/p>\n<p><a href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/04\/152204_WorkFromHomeScam.png\"><img decoding=\"async\" class=\"wp-image-15563 img-large\" src=\"https:\/\/secure-assets.readability.com\/d07a96fb3aa075eb8f099d2bcab897de5c705308\/687474703a2f2f626c6f672e656d7369736f66742e636f6d2f77702d636f6e74656e742f75706c6f6164732f323031352f30342f3135323230345f576f726b46726f6d486f6d655363616d2e706e67\" alt=\"152204_WorkFromHomeScam\" width=\"555\" \/><\/a><\/p>\n<p>Keep in mind that many work from home job offerings are often too good to be true. Use common sense and be on the lookout for job email\u00a0scams that promise you a high wage for easy work or little work. Never give out your personal details to crooks sending you unsuspecting work from home career opportunities by email. Do not reply to the message, just discard it before scammers even have a chance to obtain your email\u00a0address.<\/p>\n<p><strong>#2)\u00a0Auction scams \u2013 fake messages from online shopping sites such as eBay and Amazon<br \/>\n<\/strong><\/p>\n<p>Everyone loves shopping online. Unfortunately, scammers use the opportunity to rip off shoppers that may be unaware they are being scammed. Be weary of products advertised at a low price, poor ratings on an auction, completing a transaction outside of the auction,\u00a0and a seller insisting on\u00a0immediate payment.<\/p>\n<p>Scammers pretend to sell a product at a very cheap price in order to steal your credit card and bank account details. Another trick scammers use in online auctions is entering a low bid followed by a very high bid using a different name on a product you are selling. Also beware of \u201cmiracle\u201d products for sale online that seemingly provide unbelievable cures and weight loss capabilities.<\/p>\n<p><a href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/04\/152204_EbayScam.png\"><img decoding=\"async\" class=\"wp-image-15577 img-large\" src=\"https:\/\/secure-assets.readability.com\/f3a04e7112edd48ed4425ce11c40edd217ca0952\/687474703a2f2f626c6f672e656d7369736f66742e636f6d2f77702d636f6e74656e742f75706c6f6164732f323031352f30342f3135323230345f456261795363616d2e706e67\" alt=\"152204_EbayScam\" width=\"407\" \/><\/a><\/p>\n<p>Always find out exactly who and what you are dealing with in online auctions\u00a0and\u00a0ensure payment methods are secure by using an https\/\/: web address.\u00a0 Also, take a look at the auction privacy policy and refund\/returns policy to be sure everything seems fair.<\/p>\n<p><strong>#3) Phishing scams \u2013 fake messages from Paypal, social security administration, and banks<br \/>\n<\/strong><\/p>\n<p>Of the <strong>1%<\/strong> of users that lost money through phishing scams, <strong>53%<\/strong>were not compensated by their bank and\u00a0<strong>11%<\/strong>\u00a0say they are still waiting for compensation.\u00a0According to research conducted by<a href=\"http:\/\/googleonlinesecurity.blogspot.com\/2014\/11\/behind-enemy-lines-in-our-war-against.html\" target=\"_blank\">Google<\/a> involving phishing attacks:<\/p>\n<p style=\"padding-left: 30px;\">\u201cMost of us think we\u2019re too smart to fall for phishing, but our research found some fake websites worked a whopping <strong>45%<\/strong> of the time.\u201d<\/p>\n<p><a href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/04\/152204_PhishingBankEmail.png\"><img decoding=\"async\" class=\"wp-image-15575 img-large\" src=\"https:\/\/secure-assets.readability.com\/3b0fd5d75572ed3c1000f52e8351b475776f98f5\/687474703a2f2f626c6f672e656d7369736f66742e636f6d2f77702d636f6e74656e742f75706c6f6164732f323031352f30342f3135323230345f5068697368696e6742616e6b456d61696c2e706e67\" alt=\"152204_PhishingBankEmail\" width=\"637\" \/><\/a><\/p>\n<p>Phishing email\u00a0scams often resemble <strong>official-looking messages from retailers<\/strong>, Facebook, banks, Paypal, and eBay. The messages often ask you to confirm details that warn you to take immediate action involving your account, such as confirming your bank account details. Most phishing emails\u00a0contain special links that route you to genuine and spoofed websites. Do not fall for the massive number of\u00a0 shipping label and package tracking scams that claim you have a package on its way by means of a popular shipping service such as Fedex or UPS.<\/p>\n<p><a href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/04\/152204_FakePaypalE-Mail.png\"><img decoding=\"async\" class=\"wp-image-15569 img-large\" src=\"https:\/\/secure-assets.readability.com\/2bab850aa609b536ec97a756f623df9aecd2209d\/687474703a2f2f626c6f672e656d7369736f66742e636f6d2f77702d636f6e74656e742f75706c6f6164732f323031352f30342f3135323230345f46616b6550617970616c452d4d61696c2e706e67\" alt=\"152204_FakePaypalE-Mail\" width=\"733\" \/><\/a><\/p>\n<p>In order to prevent yourself from being a victim,\u00a0you should never send money or give personal details to strangers. Keep a periodic check on your credit card and bank statements and shred all important documents containing personal information. Always log in to a website directly and don\u2019t click on suspicious links within an email\u00a0message.<\/p>\n<p><a href=\"http:\/\/googleonlinesecurity.blogspot.com\/2014\/11\/behind-enemy-lines-in-our-war-against.html\" target=\"_blank\">Google<\/a> also discovered that users may not have much time to recover or change their login information before hackers access their account.<\/p>\n<p style=\"padding-left: 30px;\">\u201cAround <strong>20%<\/strong> of hijacked accounts are accessed within <strong>30 minutes<\/strong> of a hacker obtaining the login info.\u201d<\/p>\n<p><strong>#4)\u00a0Lottery and giveaway scams \u2013 the foreign lottery, competitions, and free vacation giveaways<br \/>\n<\/strong><\/p>\n<p>Lottery and competition scams promise a recipient a big prize\u00a0or something else to win. These types of scams are delivered in a variety of ways including \u2013 over the phone, in person, email\u00a0or by conventional mail.\u00a0The scammer will present that you have won a substantial amount of money and that all you have to do to\u00a0claim the prize is\u00a0to send money to pay fees such as taxes, customs duty, shipping, etc. Typically, users\u2019 requests to take the fees out of the winnings; but, always receive the same response from the criminals: \u201cwe cannot do that\u201d.<\/p>\n<p><a href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/04\/152204_LotteryEMailScam.png\"><img decoding=\"async\" class=\"wp-image-15582 img-large\" src=\"https:\/\/secure-assets.readability.com\/89ef7ca9b172d135a6c4bba319bd0a0771168378\/687474703a2f2f626c6f672e656d7369736f66742e636f6d2f77702d636f6e74656e742f75706c6f6164732f323031352f30342f3135323230345f4c6f7474657279454d61696c5363616d2e706e67\" alt=\"152204_LotteryEMailScam\" width=\"669\" \/><\/a><\/p>\n<p>Be wary of vacation scams that promise you a free vacation which requires you to pay a supposed service charge or purchase a membership to a travel club. Always seek the advice of a financial or legal expert before sending money.<\/p>\n<p><strong>#5 ) Advanced fee fraud scams \u2013 Promises of sending money, products, services, and special deals<br \/>\n<\/strong><\/p>\n<p>Advanced fee fraud is a popular email\u00a0scam that is also known as upfront fee fraud. It is any scam that charges you a fee and in exchange promises to send you money, products, services, and special deals. In addition to this, you may also be asked to assist in removing funds from a country in turmoil or help law enforcement catch thieves.<\/p>\n<p>The most prevalent type of scam that hit a massive amount of users is referred to as the 419 Nigerian Scam. A scammer typically will contact someone\u00a0by letter or email\u00a0and offer a share in a large sum of money which they want to export from their country. The recipient is\u00a0then asked to pay money or give bank details to help with the money transfer. The victim\u00a0must pay fees, charges and taxes to help release the money out of the country or bank account.\u00a0The scammers continue to make up fees that you must pay before you can receive your money.<\/p>\n<p><a href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/04\/152204_NigerianScam.png\"><img decoding=\"async\" class=\"wp-image-15561  img-large\" src=\"https:\/\/secure-assets.readability.com\/d9a66cee16f46cb909a0db53b92c58751a7f68de\/687474703a2f2f626c6f672e656d7369736f66742e636f6d2f77702d636f6e74656e742f75706c6f6164732f323031352f30342f3135323230345f4e6967657269616e5363616d2e706e67\" alt=\"152204_NigerianScam\" width=\"434\" \/><\/a><\/p>\n<p>Off course\u00a0you will never be sent the supposed promised funds. According to the <a href=\"http:\/\/nigerianfraudwatch.org\/statistics.html\" target=\"_blank\">Nigerian Fraud Watch<\/a> website, victims have lost a shocking <strong>12.7 billion dollars<\/strong> due to this scam.<\/p>\n<h3>Users perceive emails\u00a0by what\u00a0they see with the naked eye<\/h3>\n<p><img decoding=\"async\" class=\"wp-image-15405 img-large\" src=\"https:\/\/secure-assets.readability.com\/186ce3913f4a9f36df1991eeda56f9a576902754\/687474703a2f2f626c6f672e656d7369736f66742e636f6d2f77702d636f6e74656e742f75706c6f6164732f323031352f30342f4e616b65644579655f3135313430342e6a7067\" alt=\"Human Eye (source: Creative Commons)\" width=\"231\" \/><\/p>\n<p>Four popular universities \u2013 University of Buffalo, Brock University, Ball State University, and University of Texas in Arlington \u2013 conducted a\u00a0<a href=\"http:\/\/beta.orionshoulders.com\/Resources\/articles\/2_1291_Vishwanath%20%20Arun%3B%20Herath%20%20Tejaswini%3B%20Chen%20%20Rui%3B%20Wang%20%20Jingguo%3B%20Rao%20%20H.%20Raghav%20%282011%29.pdf\" target=\"_blank\">study<\/a>\u00a0and launched a phishing attack against a group of users. The purpose of this was to discover the psychological reason behind why people fall victim to phishing spam\u00a0emails. They state:<\/p>\n<p style=\"padding-left: 60px;\"><strong>\u201c<\/strong>Our results indicate that people process most phishing emails peripherally and <strong>make decisions based on simple cues embedded in the email<\/strong>. Interestingly, urgency cues, i.e., threats and warnings, in the email stimulated increased information processing, short-circuiting the resources available for attending to other cues that could potentially help detect the deception.\u201d<\/p>\n<p>The study reached a few conclusions:<\/p>\n<ol>\n<li>Users only process what they see with their eyes and do not perceive the potential scam with their mind.<\/li>\n<li>Users make decisions to open and read an email\u00a0based on captivating titles, graphics, testimonials, and matters of urgency such as \u201cyour bank account will be deactivated if you don\u2019t respond now\u201d. The element of fear also plays a part because a user is often scared by the title or content of an email\u00a0without asking how this is possible or why is this happening.<\/li>\n<li>Urgency cues in an email stimulate information overload. Too much is often happening within an email and that leads to the brain processing too much at one time leading to an information overload. Use of catchy titles and influential content\/graphics cause users to often miss an alert from their security product or a warning message from an email\u00a0filter that could alert them and potentially flag the scam they are about to fall victim to.<\/li>\n<\/ol>\n<p style=\"padding-left: 30px;\">\u201cThe findings suggest that <strong>habitual patterns of media use combined with high levels of email load<\/strong> have a strong and significant influence on individuals\u2019 likelihood to be phished.\u201d<\/p>\n<h3>How to avoid being victimized by email\u00a0scams<\/h3>\n<ul>\n<li>Be aware of unsolicited\u00a0email\u00a0attachments that use suspicious email addresses. Never click on a seemingly suspicious looking link. Hover over a link with your mouse to reveal the destination address to confirm if its legit.<\/li>\n<li>Don\u2019t click on urls in emails that requests login with a password.\u00a0Instead,\u00a0visit the website manually, login there and look for the information that was promoted in the email.<\/li>\n<li>Don\u2019t fall for the top five email\u00a0subject bait lines that scammers use: invitation to connect on\u00a0LinkedIn, Mail delivery failed: returning message to sender, Dear (name) customer, Comunicazione importante, and undelivered mail returned to sender.<\/li>\n<li>Use a spam\/junk mail filter. Learn how to filter your email\u00a0messages in order to separate the good from the bad. According to <a href=\"http:\/\/usa.kaspersky.com\/about-us\/press-center\/in-the-news\/more-70-email-spam\" target=\"_blank\">Kaspersky<\/a>, over 70% of emails\u00a0are spam related. Another option may be to use a dedicated software to filter and block potentially unsafe messages such as<a href=\"http:\/\/www.mailwasher.net\/\" target=\"_blank\">MailWasher<\/a>.<\/li>\n<\/ul>\n<p><a href=\"http:\/\/blog.emsisoft.com\/wp-content\/uploads\/2015\/04\/RecognizeFakeEmail_151304.jpg\"><img decoding=\"async\" class=\"wp-image-15351 img-large\" src=\"https:\/\/secure-assets.readability.com\/212529b19c55640a4e1d1b3141273a2442500785\/687474703a2f2f626c6f672e656d7369736f66742e636f6d2f77702d636f6e74656e742f75706c6f6164732f323031352f30342f5265636f676e697a6546616b65456d61696c5f3135313330342e6a7067\" alt=\"Recognize Fake E-Mails\" width=\"648\" \/><\/a><\/p>\n<ul>\n<li>If an email\u00a0message is seemingly suspicious, make contact through other means to verify the source and authenticity of the\u00a0email. If a message is legitimate, finding a contact number to the source should be an easy task.<\/li>\n<\/ul>\n<p>Have you seen these type of emails scams going around? What other ones are you aware of? Have a great (scam-free) day!<\/p><\/blockquote>\n<p>Thanks to Emsisoft for allowing us to republish this excellent article in our newsletter and Web sites. \u00a0<span style=\"text-decoration: underline;\"><strong>Y<a href=\"http:\/\/goo.gl\/ANbt6f\" target=\"_blank\">ou can view the original article here.<\/a><\/strong><\/span><\/p>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>About this article&#8230; Again, with permission of our friends at Emsisoft, we&#8217;re featuring this article about email safety and how you can tell spam and scams from safe email. Don&#8217;t scoff and think you know how to tell &#8211; it&#8217;s not as easy as it use to be. Scammers and spammers have honed their skills and now nearly\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/45-of-all-users-cannot-tell-a-scam-email-from-a-safe-one-can-you\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1655,1669,1426,1670,1656,1654,1674],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/9427"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=9427"}],"version-history":[{"count":1,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/9427\/revisions"}],"predecessor-version":[{"id":9428,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/9427\/revisions\/9428"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=9427"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=9427"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=9427"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}