Email Spam and Scams

Welcome to the Fast-Air Tech Talk newsletter. The Tech Talk newsletter is a free service for all Fast-Air customers. Please suggest newsletter topics.

Just about every person on the planet who uses email has received email spam and scam emails.

Spam emails are unsolicited emails — unrequested email. The term is derived from the name of a well-known canned meat product. The term originated from a 1970 Monty Python skit where the meat product Spam(tm) is included in almost every menu selection at a restaurant.

Generally these days, the term spam includes just about any kind of unsolicited electronic communication. Several trillion spam emails are sent every year.

Scam mails are attempts to swindle recipients out of various forms of property.

Both types of email are viable business models because of the low entry barriers. Little more than a computer is needed to sustain the business.

Yes, business. People make a living from swindling others.

There are various forms of spam that are more correctly called junk mail. When people create accounts with online merchants, often they forget to opt-out of receiving solicitation emails and advertising. Many online merchants sell email address lists to other people. The cascading effect is a deluge of unwanted emails. Be certain that most if not all online merchants have a default opt-in policy for receiving junk mail and advertising.

In the early days of spam and scam emails, an easy clue of such mails was the poor spelling and grammar. Such emails still exist today but more often there are professionals writing the emails to create a sense of plausibility.

People who send scam emails often use the basics of social engineering in an attempt to trick people. Many of these scam emails take the form known as phishing, which is a method of trying to obtain private or sensitive information. Usually information that allows the scammer to steal money or property.

There are many varieties of email scams, such the advanced fee scam, also known as the 419 scam. Impersonation email scams are common too, where the scammer pretends to be somebody important.

Careful email users are able to avoid spam and scam emails. Is there some dark secret to avoiding these types of email?

Not really. As usual, the key is knowledge.

For those who are experiencing an overwhelming amount of unwanted email, there is a simple solution. Actually, there is only one solution.

Move.

No, not physically. Rather, terminate the email account receiving the high volume of unwanted email and move to a different email account. From that point forward be extra careful about disclosing the email address.

When using online merchants, be certain to find the merchant’s opt-out selection. For existing merchant accounts, log in and find the option. Opt-out. If necessary, log into the merchant’s account and change the email address as well as opting out of junk mails.

Likewise with social media accounts. Diligently search for all opt-out options.

Use throw-away or secondary email addresses. That is, do not use regular email addresses for certain online activities. Use a second email address that is easily terminated or where junk mail is not annoying.

Use preferred email addresses only with trusted people.

Although some people enjoy the hobby of scam baiting, most recipients of scam emails are better off not opening or responding to such emails.

Avoiding these types of emails include some simple guidelines:

  • Don’t click on links or download attachments in email from people you don’t know.
  • Don’t click on links or download attachments in email from people you DO know when the email looks fishy (or phishy in this case).
  • Don’t click on links in Facebook that look odd for the person posting.
  • Don’t click on links or download attachments in email from companies, including the companies you do business with. Instead visit the company’s site manually to view the latest sales or deals.
  • Don’t install programs or browser extensions from unsolicited email, Facebook, or Twitter links.
  • Don’t visit shady web sites or web sites promoting certain forms of entertainment.
  • Never provide personal information to strangers.
  • Always opt-out from receiving solicitation emails when buying or receiving merchandise online.

There are two security related tips.

  • Use BCC rather than CC when sending email to many people. Likewise when replying to an email that includes many people.
  • Never use your email password as the password for any other online activity.

CC is an acronym for Carbon Copy and BCC is an acronym for Blind Carbon Copy. The terms are derived from the dead tree days of writing correspondence. Sending an email using CC exposes all email addresses to all recipients. BCC does not expose this information to any recipient. This is a security and privacy issue. Malware often is designed to search email correspondence to garnish additional email addresses.

Enrolling in a new online activity or creating an account requires using an email address as a form of contact. For example, joining an online discussion forum. These types of activities are good examples of when to use a secondary email address.

Moreso, never use an email password as the forum password. Create a new password.

Too many passwords to remember? Remember, most people face no security consequences by writing the passwords on paper and placing the paper in a safe location.

An easy way to manage junk mail? Use a mail client or service filtering features.

Technical tip: There is a scam called the “Yes” scam. The scammer records the conversation. All of these scams are designed to get the person to say the word “Yes.” There are variations of the scam, but the most common method circulating is asking whether the person can hear the caller. Other questions might appear innocent, such as “Are you the head of the household?” The scammer might pretend to be from a legal organization, such as Social Security or police. Should the person reply, “Yes,” the recorded response is used to authorize payments for various services, such as billing the person’s phone account or credit card. Hang up the phone when an unknown caller asks any question designed to solicit a “Yes” reply.

Family time: What is the longest running comic strip? Think you know? Search the web.

Next issue: Computers and Sleeping

Do you think you shoveled and plowed a lot of snow this winter?
Video

Latest posts by Backwoods Geek (see all)