Sunday 25 November 2012

Twitter Phishing scam - USER BEWARE!!! FW: Mtlaurora (@dawnlaurora) has sent you a direct message on Twitter!

This was NOT from Twitter it was from http // ivtvtter com (punctuation removed!!) It is a Phishing scam that will take you to a log-in page that looks like Twitter..... IT IS NOT do NOT enter any information on this site they will hijack your Twitter account
@dawnlaurora - Hey this person is spreading horrible rumors around about you...
     
 xxxxx ,
You have a new direct message.
   
     
Mtlaurora Mtlaurora
@dawnlaurora
Hey this person  BIT.LY link here  is spreading horrible rumors around about you...
11:51 PM - 20 Nov 12

Message @dawnlaurora

-----Original Message-----
From: Twitter [mailto:n-tyhgraserr=pryvnp-qvfrnfr.pb.hx-bd565@postmaster.twitter.com]
Sent: 20 November 2012 23:52
To: My Twitter Username was here!!!!
Subject: Mtlaurora (@dawnlaurora) has sent you a direct message on Twitter!

______________________________________________________________

 
 
 
 

Saturday 17 November 2012

Yet another false Win Claim... FW: YOU ARE A WINNER!!

Short and sweet and a load of rubbish!!


Dear Winner,

Congratulation. you have won the sum of US$1,000.000.00
from the 2012 UN aid programme. your Ref No.is 150018IPD contact Mrs Rita Ann on this email:  onlinedraw_y@yahoo.com

quoting your Ref.No. for your claim and clarification


Thanks You
Ms Betty Osman


-----Original Message-----
From: Yahoo - Microsoft Online Draw [
mailto:bettyosman111@hotmail.com]
Sent: 16 November 2012 13:52
To: undisclosed-recipients:
Subject: YOU ARE A WINNER!!

__________________________________________________________

 
 
 
 


 

Thursday 8 November 2012

VERY IMPORTANT - Read this if you have any web-sites of your own - FW: Domain ********.com

This is a scam of the highest order.
 
The email looks convincing enough but the company has no association with your domain name (or mine). The link will take you to what looks like a valid payment page where it asks for your credit card details including the 3 digit security number. They are asking $75 for renewal for a domain name that is only $4.99 a year!!
 
It's made more convincing by having my correct real-world address in the email which suggests they have harvested detaild from the 'whois' database. You can pay a couple of bucks a year to have these detaild hidden, maybe worth considering, I certainly will from now on. (I have hidden personal details in the example below but believe me they were mine).
 
They say that your domain will expire and you may loose it - Rubbish, the expiry date shown below is NOT the expiry date of the domain they tried to convince me to renew.
 
The unsubscribe address below is to a PO box, if you're not convinced, search PO Box 4668 New York on line and see what others are saying.
 
Only EVER renew your domains yourself through the site that they are registered with, you risk loosing your identity, your domain and your bank balance, BEWARE!!
__________________________________________________________________________________
 
 -----Original Message-----
From: Attn Expiring Registration for Domain [mailto:noreply@securetrans75675.com]
Sent: 08 November 2012 07:21
To:  **** @ **********. co.uk
Subject: Fwd: Domain  ************* .com

Expiration Notice

Order #: 26604765
Order Date: Nov 8, 2012
Bill To:  My Name was here  
Home Address was here 
Home Phone number was here 
 
Payment link was here            
                                                                Hidden text with domain name and cost of $75 was here 

Domain:  ******** .COM

To:  My Name was here 

Don't miss out on this offer which includes search engine submission for  ******** .COM for 12 months. There is no obligation to pay for this order unless you complete your payment by Nov 23, 2012. Our services provide submission and search engine ranking for domain owners. This offer for submission services is not required to renew your domain registration.

Failure to complete your search engine registration by Nov 23, 2012 may result in the cancellation of this order (making it difficult for your customers to locate you using search engines on the web). 

Graphic with domain name
and link removed from here

UNSUBSCRIBE INSTRUCTIONS

You have received this message because you elected to receive special notifications and offers. If you no longer wish to receive our special notices, please  link removed  or mail us a written request to the attention of: Customer Contact Manager, PO Box 4668 New York, NY 10163. Please allow up to four weeks for the complete unsubscribe process to take place. NOTE: If you have multiple accounts with us, you must opt out for each one individually in order to fully stop receiving these notifications. This message is CAN-SPAM compliant.

Please do not reply to this email, as we are not able to respond to messages sent to this address.  

_________________________________________________________________________ 

 
 
 
 

Saturday 3 November 2012

VIRUS ALERT - BEWARE!!!- FW: Mail System Error - Returned Mail

This was sent with an attachment called "Instruction.zip" containing a
virus/trojan, trapped by AVG thankfully!!


Dear user of *********.co.uk,

We have received reports that your email account has been used to send a
large amount of junk e-mail messages during this week. Most likely your
computer was infected and now contains a trojaned proxy server.

Please follow our instruction in the attached file in order to keep your
computer safe.

Best regards,
**********.co.uk support team.

-----Original Message-----
From: Post Office [MY OWN EMAIL ADDRESS WAS HERE]
Sent: 03 November 2012 03:21
To: **********.co.uk
Subject: Mail System Error - Returned Mail
--------------------------
Viruses found in the attached files
* instruction.zip: Virus identified I-Worm/Mydoom.O. The attachment was
moved to the Virus Vault.

Checked by AVG - www.avg.com
Version: 2012.0.2221 / Virus Database: 2441/5370 - Release Date: 11/02/12
--------------------------
Latest Scam eMails brought to you by MarketUK - Free Classifieds

http://www.marketuk.co.uk

Find us on Facebook