Jan 312017
 

Scams are flooding our telephone lines.

Spammers and hackers are flooding our internet connections and getting viruses, worms, and phishing emails into our computers and email.

Obviously these scammers and hackers have enough success that they are encouraged to scam and hack even more.

How are they so successful?

Can you recognize an attempt to hack into your computer or elicit sensitive information from you when one such email enters your inbox?

We will begin a series on how to identify these, what to look for, so that you’re not the victim of a cyber-attack.

Below is one spam message that we received the other day.  It is easily identifiable as a hacking attempt to infect our computers in so many ways. I’ve omitted including the hack link, of course.

See how many identifiers you can find.

See below:
___________________________________________________________________________________
Dear Joey,

Your item has arrived at the USPS Post Office at January 23, but the courier was unable to deliver parcel to you.

Download postal receipt attached to e-mail!

 

Kind thoughts,

 

Freddie Horne,

 

USPS Support Agent.
___________________________________________________________________________________

 

 I identified at least ELEVEN errors that immediately stood out to me as an obvious attempt to infiltrate my computer.
What are they?

And the 12th obvious indication?

Please add your responses to the COMMENT box below. Let’s see if we can get all twelve.

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

(required)

(required)