- Comments: 27
- Written on: April 6th, 2010
While it is certainly nothing new, yet another threat to your email security is floating around the internet.
This email made it through our formidable spam filters (as well as through Google’s filters) to find its way to my inbox.
This e-mail was send by schrockinnovations.com to notify you that we have temporanly prevented access to your account.
We have reasons to beleive that your account may have been accessed by someone else.
Please click on the following link (or copy & paste it into your web browser):
As usual, the message is plagued with misspellings and the link (removed in my example) to the instructions.exe file would have attempted to infect my computer.
As a general rule, email system administrators do not send broadcast emails to users notifying them of an intrusion.
- Comments: 0
- Written on: April 12th, 2008
I was doing some research on how Feedburner calculates the subscriber count that is displayed in the Feedburner chicklet. It appears that subscribers who sign up through RSS readers are not counted in the same way as those who subscribe via email.
- Comments: 12
- Written on: March 20th, 2008
Long story short, I figured it out and here is how you can experience the pure joy of checking email on your iPhone, avoiding almost all spam, AND as a special bonus have everything you do on your iPhone synchronized with your Outlook email client in REAL TIME matter where you are in the world!
- Comments: 0
- Written on: July 27th, 2006
I received an alert today from Symantec about a disturbing rise in the number of fake email messages that purport to be from legitimate online retailers. Apparently, these messages are sent via bulk-email to unsuspecting individuals. The emails state that an invoice for a recent purchase at the online retailer is attached, and that you should open it to verify your order.
When the email attachment is opened, the user’s computer is infected with a Trojan horse virus that allows an unknown party to take control of your computer and its Internet connection at a later time for any number of nefarious purposes.