Pst... Pass It On... I Found Out Its a Hoax

When you receive an email telling you about a virus, what do you do with it? Do you send it to everyone in your address book to help them protect themselves too?

A virus warning is probably on its way to your inbox right now, claiming to be from a credible source and warning you of a dangerous virus on the loose. Beware. You might be tricked into taking part in an Internet hoax - chain mail virus alerts.

It is believed that 60% plus of the Virus Warnings in circulation are hoaxes. Further, your anti-virus software may already have a cure for this particular ailment IF it is real.

Even old hoaxes, which have been around for years, can make the rounds again, according to Trend Micro, an anti-virus software company.

'There are a number of new hoaxes because they are so easy to write, you don't need to be a programmer,' the anti-virus company spokesperson said.

What about all of those 'Get Paid to Send Email' schemes? Do you forward them along too, because you do not know if they are true or not, and figure 'why should I take the chance that it is not real?' These 'Get Paid to Send Email' schemes are a fine example of hoaxes that can make the rounds again and again.

There have been at least a dozen incarnations of a 'Get Paid to Send Email' hoax recorded at several of the hoax sites listed in this article. For the complete story, try the search terms 'Bill Gates' or 'Nike' or 'AOL / Microsoft' at any of the Hoax sites.

Let me cut to the chase, no one has the technology to track emails sent through the Internet! No one will ever pay you for sending emails to everyone in your address book! This story is a verified hoax.

Here is a list of Hoax Information Sites that you can check the validity of the warning or the message in your email inbox. You might just be surprised by which items are hoaxes and which are not.

For those people who don't know the tell-tale signs of hoaxes, here's a checklist:

  • IBM/Microsoft/Dell/Gateway have verified this. Does anyone think they care? They don't. If it said Norton, McAfee or any other antivirus vendor I might listen. If a virus killed your computer or software the above companies would be delighted because you'd have to buy more computers, and they would be delighted to sell you one.

  • Even if the email proclaims that one of the virus companies is verifying this virus, where is the link to the virus companies website, detailing the important information concerning this particular strain of virus?

  • Published on CNN. Again, where is the link? Could you find it yourself?

  • You'll never be able to use your computer again. Hogwash. If you got a virus the very worst case is that you'd have to format it and reinstall everything. And that's extremely rare anyway. No virus will harm your computer, only the software on it.

  • This virus damages/destroys Windows and McIntosh systems. More hogwash. These are two very different operating systems with very different ways of executing software.

  • Don't even open it! Yea right. 99.9% of virii are carried in attachments to emails not in the emails themselves. Use a bit of common sense and don't open any unexpected attachments from strange sources. And if you keep your AV software up to date, you're most often covered anyway. (The only email software not safe from some types of viruses are Outlook, Outlook Express, and Netscape 6. Users of Outlook and Outlook Express can visit http://www.kumite.com/myths for the patch to protect these email programs from imbedded vb-script viruses. Netscape 6 users can guarantee their own protection by turning off the JavaScripting feature inside of their Preferences.)

  • Forward to all your friends. Now we're down to the crutch of it. This email IS the virus - a social one. Look at the facts. It gets sent to all your friends. It infects peoples inboxes and causes panic. Sounds like a virus to me. It doesn't actually do any harm like most virii but is a waste of your time.

  • Verify these things yourself before forwarding them. To simplify the task of verification, there is a new freeware application on the market designed to help you do just that. It is called 'Quick Swords V' and it has been developed for you by a new company called InternetMusketeers.com. The 'V' stands for 'Virus'.

    Here is an overview of how the software works: 'Simply type in your Search Terms, then click on the Virus / Hoax Information Searches drop down list, and then select your choice for expert guidance on the subject of Viruses and Hoaxes. With Quick Swords V, we can help take the guesswork out of your decision making process. We are giving you direct access to the nearly immediate search results of 16 Virus / Hoax sites on the Internet.'

    Quick Swords V (virus) ships as Freeware, so you have no excuse not to verify the Virus information before sending it to everyone in your address book anymore. It only takes a minute to verify the latest juicy warning in your email box. I know your mouse finger is itching to click Forward, but your friends will Thank You for verifying this information before hitting Send!

    Instead, click here: http://www.kumite.com/myths

    I would like to thank the following people for assisting me in the gathering of the information presented in this article:

    • Steven McCarthy, Co-Owner of A Helping Hand at: http://learn.at/ahh

    • Christy, Co-Owner of http://Hackfix.org; a non-profit site dedicated to fighting worms and trojans

    • Mike Banks, the Owner of Mikes What's News at:

      experienced cleaning professionals Northbrook ..
      In The News:

      Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
      Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
      Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
      New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
      Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
      Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
      Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
      Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
      A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
      Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
      A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
      Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.
      Astronomers have discovered asteroid 2025 SC79, a skyscraper-sized space rock orbiting the sun in just 128 days. the second-fastest known.
      The Fox News AI Newsletter delivers the latest developments form the world of artificial intelligence, including the technology's challenges and opportunities.
      A cyberattack on SimonMed Imaging exposed personal information of 1.2 million patients, including medical records, financial details and identity papers.
      Spotify's managed accounts for kids under 13 now available in at least seven countries, allowing parents to filter and block explicit content and songs.
      Friendly text conversations about BBQs and social events can lead to WEEX gold trading scams that target older adults with fake investment opportunities.
      California company Skyeports creates self-healing glass spheres from Moon regolith that generate solar power and support plant growth for sustainable lunar living.
      Cleafy researchers discover fake VPN streaming app Mobdro Pro that installs Klopatra banking Trojan, giving attackers full control over Android devices.
      Police departments across the U.S. and Canada are adopting virtual reality training to better prepare officers for high-pressure, real-world situations.
      House Bill 469 would prevent AI systems from owning property, serving as executives, or gaining legal personhood in Ohio under Representative Thaddeus Claggett's proposal.
      Public voter records expose retirees' personal details to election scammers who create targeted cons using names, addresses, and voting history data.
      Instead of fearing what comes next with artificial intelligence, think outside the box. Here are high-earning AI jobs that don't require a computer science degree.
      OpenAI CEO Sam Altman says polite words like "please" and "thank you" cost millions annually, while direct prompts may improve ChatGPT accuracy by several points.
      Chattee Chat and GiMe Chat exposed intimate conversations and photos, revealing users spent up to $18,000 on AI companions before the breach.
  • CAN-SPAM Basics

    I. BACKGROUNDThe CAN-SPAM Act of 2003 (Controlling the Assault of... Read More

    The Anti Spam Challenge ? Minimizing False Positives

    Email is the quintessential business communication tool, so when it... Read More

    Is Email Dying?

    2004 was really a year when the whole subject of... Read More

    How Spammers Fool Spam Blacklists - And How to Stop Them

    Effectively stopping spam over the long-term requires much more than... Read More

    All About Spam

    Spam is annoying. Period. Why people would want to send... Read More

    Junk Mail Works!

    Junk mail works. Why does it work? How does it... Read More

    The 4 Ws of Junk E-mail

    Junk e-mail or spam has become the scourge of the... Read More

    Blackhole or Fail - Which One Is Better For Your Mail Server?

    Very often SPAMMERS take advantage of catch-all email setup on... Read More

    A War on SPAM: Attacking The Evil

    As most small, medium and large businesses in this country... Read More

    How Spammers Fool Bayesian Filters - And How to Stop Them

    Effectively stopping spam over the long-term requires much more than... Read More

    Email Chain Letters - Harmless Fun or Not?

    I'm sure I'm not the only person on the planet... Read More

    How To Stop Spam

    I imagine you have seen, heard about, or already know... Read More

    The Definition of Spam

    Spam can bring down your website faster than a speeding... Read More

    Winning the War On Spam

    For years I didn't worry much about spam.But lately it's... Read More

    Lockspam Free 3.0 Released!

    6 August, 2004: Polesoft Inc., home of Professional anti spam... Read More

    Protecting Yourself With A Porn Filter

    The harmful affects of pornography use and addiction are well... Read More

    What Exactly is Spam?

    Spam, as defined in the context of computers, the Internet... Read More

    The Trouble With Spam Is....

    Each day we all face the same challenge. Spam. It... Read More

    Challenge Response Spam Filters Explained

    As the flood of spam increases end users are looking... Read More

    Are You A Spam Zombie?

    Over the past few years you've all become familiar with... Read More

    Corporate Email Policies Lower Unnecessary Legal and Security Risks

    What comes to your mind when you think about your... Read More

    Spammer Stole My Email Address?

    Do you get bounced, or rejected emails sent by someone... Read More

    ANTI-S*P^A#M: Protecting Your Web Sites Email Address(es)

    Did you know that there are software programs that view... Read More

    Phishing for an Identity

    Phishing is rapidly becoming on the largest threats to your... Read More

    Im Guilty Until Proven Innocent

    No doubt about it."Spam" (unsolicited commercial email) threatens to paralyze... Read More

    best value cleaning service Northbrook ..