Pst... Pass It On... I Found Out Its a Hoax

When you receive an email telling you about a virus, what do you do with it? Do you send it to everyone in your address book to help them protect themselves too?

A virus warning is probably on its way to your inbox right now, claiming to be from a credible source and warning you of a dangerous virus on the loose. Beware. You might be tricked into taking part in an Internet hoax - chain mail virus alerts.

It is believed that 60% plus of the Virus Warnings in circulation are hoaxes. Further, your anti-virus software may already have a cure for this particular ailment IF it is real.

Even old hoaxes, which have been around for years, can make the rounds again, according to Trend Micro, an anti-virus software company.

'There are a number of new hoaxes because they are so easy to write, you don't need to be a programmer,' the anti-virus company spokesperson said.

What about all of those 'Get Paid to Send Email' schemes? Do you forward them along too, because you do not know if they are true or not, and figure 'why should I take the chance that it is not real?' These 'Get Paid to Send Email' schemes are a fine example of hoaxes that can make the rounds again and again.

There have been at least a dozen incarnations of a 'Get Paid to Send Email' hoax recorded at several of the hoax sites listed in this article. For the complete story, try the search terms 'Bill Gates' or 'Nike' or 'AOL / Microsoft' at any of the Hoax sites.

Let me cut to the chase, no one has the technology to track emails sent through the Internet! No one will ever pay you for sending emails to everyone in your address book! This story is a verified hoax.

Here is a list of Hoax Information Sites that you can check the validity of the warning or the message in your email inbox. You might just be surprised by which items are hoaxes and which are not.

For those people who don't know the tell-tale signs of hoaxes, here's a checklist:

  • IBM/Microsoft/Dell/Gateway have verified this. Does anyone think they care? They don't. If it said Norton, McAfee or any other antivirus vendor I might listen. If a virus killed your computer or software the above companies would be delighted because you'd have to buy more computers, and they would be delighted to sell you one.

  • Even if the email proclaims that one of the virus companies is verifying this virus, where is the link to the virus companies website, detailing the important information concerning this particular strain of virus?

  • Published on CNN. Again, where is the link? Could you find it yourself?

  • You'll never be able to use your computer again. Hogwash. If you got a virus the very worst case is that you'd have to format it and reinstall everything. And that's extremely rare anyway. No virus will harm your computer, only the software on it.

  • This virus damages/destroys Windows and McIntosh systems. More hogwash. These are two very different operating systems with very different ways of executing software.

  • Don't even open it! Yea right. 99.9% of virii are carried in attachments to emails not in the emails themselves. Use a bit of common sense and don't open any unexpected attachments from strange sources. And if you keep your AV software up to date, you're most often covered anyway. (The only email software not safe from some types of viruses are Outlook, Outlook Express, and Netscape 6. Users of Outlook and Outlook Express can visit http://www.kumite.com/myths for the patch to protect these email programs from imbedded vb-script viruses. Netscape 6 users can guarantee their own protection by turning off the JavaScripting feature inside of their Preferences.)

  • Forward to all your friends. Now we're down to the crutch of it. This email IS the virus - a social one. Look at the facts. It gets sent to all your friends. It infects peoples inboxes and causes panic. Sounds like a virus to me. It doesn't actually do any harm like most virii but is a waste of your time.

  • Verify these things yourself before forwarding them. To simplify the task of verification, there is a new freeware application on the market designed to help you do just that. It is called 'Quick Swords V' and it has been developed for you by a new company called InternetMusketeers.com. The 'V' stands for 'Virus'.

    Here is an overview of how the software works: 'Simply type in your Search Terms, then click on the Virus / Hoax Information Searches drop down list, and then select your choice for expert guidance on the subject of Viruses and Hoaxes. With Quick Swords V, we can help take the guesswork out of your decision making process. We are giving you direct access to the nearly immediate search results of 16 Virus / Hoax sites on the Internet.'

    Quick Swords V (virus) ships as Freeware, so you have no excuse not to verify the Virus information before sending it to everyone in your address book anymore. It only takes a minute to verify the latest juicy warning in your email box. I know your mouse finger is itching to click Forward, but your friends will Thank You for verifying this information before hitting Send!

    Instead, click here: http://www.kumite.com/myths

    I would like to thank the following people for assisting me in the gathering of the information presented in this article:

    • Steven McCarthy, Co-Owner of A Helping Hand at: http://learn.at/ahh

    • Christy, Co-Owner of http://Hackfix.org; a non-profit site dedicated to fighting worms and trojans

    • Mike Banks, the Owner of Mikes What's News at:

      move in cleaning service Wilmette ..
      In The News:

      Privacy risks are hiding in plain sight, as your personal data is likely being collected, tracked, and sold without your knowledge.
      VenHub, a fully autonomous, AI-powered smart store just opened at the LAX/Metro Transit Center in Los Angeles.
      A woman's Facebook account takeover reveals dangerous social engineering tactics and provides lessons on recovery, avoiding scams and enacting stronger security measures.
      Shanghai engineers are using 432 walking robots to relocate a complex, preserving Shikumen architecture while creating space for a modern underground hub and cultural center.
      Major healthcare data analytics firm Episource had a cybersecurity incident exposing 5 million patients' medical records and personal information in recent breach.
      A new sophisticated PayPal scam sends legitimate-looking emails from official PayPal addresses, using phone numbers instead of links to convince victims to download remote access tools.
      Fox News' AI Newsletter brings you the latest on this rapidly evolving technology.
      The innovative Kara Pod device extracts moisture from air to create mineral-rich water and brew coffee, featuring UV sterilization and compatibility with Nespresso pods.
      Gov. Hochul unveiled New York's nuclear power plant project to power a million homes, which faces permit challenges while promising jobs and a cleaner energy future.
      SAFE introduces Aerie, an underground luxury bunker combining high-end living with advanced security, wellness amenities and interactive walls simulating panoramic views.
      A Facebook scammer posing as Elon Musk tricked a victim with promises of a Tesla and $250,000, requesting gift cards that become untraceable once the codes are shared.
      Experience hands-free golfing with the Robera Neo smart caddie that uses AI to follow you, navigate obstacles and carry your clubs with GPS course mapping.
      Cybersecurity alert: 16 billion passwords exposed in massive credential database affecting major platforms. Protect your accounts with password managers
      The innovative BeBot robot uses electric power to remove pollution from shorelines, covering 20-30 times more area than manual collection while preserving wildlife.
      A new ClickFix campaign targets macOS users with fake Spectrum support sites, tricking victims with CAPTCHA failures to paste commands that install information-stealing malware.
      AI-powered autonomous trucks from Plus Automation are being tested across the U.S., Europe and Asia to solve logistics challenges while facing regulatory hurdles and labor concerns.
      Your health information might feel private and secure with your doctor, but the reality is far more complicated. Data brokers collect a wide range of sensitive health data, from diagnoses and prescription details to personal identifiers, and sell this data to marketers, insurers, and other third parties.
      Kepler Robotics has officially introduced its Forerunner K2 "Bumblebee" humanoid robot at the SAIC-GM automotive plant in Shanghai, marking a significant moment in the real-world deployment of advanced robotics.
      Scammers never seem to be running out of new ways to try and get their hands on your money – and lately, they've been getting sophisticated.
      Thirty people were injured and killed, though the exact number remains currently unknown, when a suicide bomber blew himself up in a Damascus church.
      Unexpected password reset alerts signal potential hacking attempts or phishing scams. Learn how to respond and establish stronger security measures for your accounts.
      A historic electric airplane flight landed at JFK with passengers, marking a milestone as Beta Technologies demonstrates the practicality and efficiency of electric air travel.
      The Chaos ransomware group breached Optima Tax Relief in a double-extortion attack, stealing sensitive customer case files and corporate documents with personal information.
      Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
      The first human brain-computer interface by Paradromics was completed in 20 minutes, featuring microelectrodes to help paralyzed individuals control computers with thoughts.
  • Anti Trackback and Comment Spam Methods

    What is spam ? ... Read More

    What to Do to Avoid Getting Banned

    How would you feel if you found a link on... Read More

    The 4 Ws of Junk E-mail

    Junk e-mail or spam has become the scourge of the... Read More

    Getting Back To Basics.

    While we all agree that there`s way too much spamming/junk-mailing... Read More

    Beware Of Spam Withdrawals

    Q: I am so sick of all the spam that... Read More

    Three Faces of SPAM

    Like everybody who will ever read this, I get spam... Read More

    All About Spam

    Spam is annoying. Period. Why people would want to send... Read More

    How To Analyze A Rip-Off Scheme

    This review is taken DIRECTLY from a piece of "junk... Read More

    Internet Theft and Fraud

    My friends in the web hosting business have recently informed... Read More

    A War on SPAM: Attacking The Evil

    As most small, medium and large businesses in this country... Read More

    Spam eMails Are Not Just Annoying - They Are A Main Distributor Of Viruses

    Why is someone from India, Africa, or elsewhere writing you... Read More

    Bayesian Spam Filters Explained

    In a word Bayesian spam filters are "intelligent". Bayesian spam... Read More

    Sick Of Wading Through Spam?

    It's a nightmare isn't it? You fire up your email... Read More

    ANTI-S*P^A#M: Protecting Your Web Sites Email Address(es)

    Did you know that there are software programs that view... Read More

    Take Back Control of Your Inbox: Eliminate Annoying and Potentially Harmful E-mails

    Are you tired of spam stealing your time, your money,... Read More

    The Cybermagic of Whitelists

    Before we start getting deep into the meat of this... Read More

    How Spammers Fool Spam Blacklists - And How to Stop Them

    Effectively stopping spam over the long-term requires much more than... Read More

    SPAM: A Nutrious Food or a Waste of Time?

    Unless the filters on your computer are really good, you're... Read More

    How Can I Stop Getting Spam?

    Are you getting too much spam? We all are, but... Read More

    A Practical Approach to Eliminate Spam

    Spam is out of control! I guess that would be... Read More

    FTC Botches Fight on SPAM, Microsoft Takes Over the Battle

    While the Federal Trade Commission is busy fighting over definitions... Read More

    CAN-SPAM Basics

    I. BACKGROUNDThe CAN-SPAM Act of 2003 (Controlling the Assault of... Read More

    Avoiding the Spam Trap: Get Your Message Delivered!

    Your message is not being delivered.If you send emails to... Read More

    Block Spam with An Easy Behavioral Change

    E-mails now have a connection back to their servers. I... Read More

    Demand for Spam? It exists

    Do you like spam? No, I'm not kidding. Everybody knows... Read More

    green cleaning service Lincolnshire ..