Feb 052017



Scams are flooding our telephone lines.

Spammers and hackers are flooding our internet connections and getting viruses, worms, and phishing emails into our computers and email.

Obviously these scammers and hackers have enough success that they are encouraged to scam and hack even more.

How are they so successful?

Can you recognize an attempt to hack into your computer or elicit sensitive information from you when one such email enters your inbox? How well can you PROTECT YOURSELF?

Below is second in our series on how to identify these, what to look for, so that you’re not the victim of a cyber-attack.

The spam message below is easily identifiable as a hacking attempt to infect our computers in so many ways. Being that Apple is so ubiquitous, users can easily think that this message is intended for them.

I’ve broken the hack link, of course.

See how many identifiers you can find.

See below:

Dear (Your email address here),

Please note that your account will expire in less than 48h .
It is imperative to conduct an audit of your information is present, otherwise your account will be destroyed.
Update Your Apple ID
We invite you to act fast, if you need any help you can contact our online support.


I’m able to identify up to ten different obvious identifiers.

Enter your ideas into the “COMMENT” box below.

Let’s see how well you do. Let’s see how safe you are from spammers and scammers!!

 Leave a Reply

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>