What To Do When You Get Spam

When you go to your mailbox and find pieces of junk mail mixed in with important correspondence, you throw it out. It is a mild nuisance and you probably don't even give it a second thought. Unfortunately, most people do the same when spam arrives in their inbox. They just delete it.

While that does get rid of an individual email, more needs to be done to control what can become an overwhelming problem. Liken spam to cockroaches; see one in your cabinet and you know that you likely have an infestation that needs to be dealt with swiftly.

To begin with, do not respond to the spam ? ever. There are usually two ways that spam recipients make this mistake. First is the opt-out clause that appears at the bottom of the email. It appears to be a legal statement giving you the right to remove yourself from this mailing list. Unless you legitimately authorized the company to send you mail, in which case this is not spam, do not follow this link. Most often this link is simply a way for the spammers to identify your email address as valid. Now they can sell your address to other spammers and thank you for making their work easier by continuing to send you the spam you didn't want in the first place.

The second manner in which this error occurs is when, out of total frustration, you reply to the sender with a firm statement of your disgust. This usually happens when the spam is pornographic material and despite your best efforts, keeps appearing in your inbox. Sometimes the reply will not work because the sender's email address is a fake one and it will just bounce back to you as undeliverable. Count yourself lucky because the alternative means that they now have a confirmation of your address.

Next, read the email header. The header contains the full path of computers through which the email passed to get to you. Most pieces of email pass through at least four computers ? the spammer's, their ISP, your ISP, and finally yours. Since the stated from address is usually a fake one, this is the most reliable way to track down the spammer's ISP, at the very least.

Each computer that the spam travels through will add lines to the header stating who they are, who the mail came from, and where they are sending it. Headers can seem complicated, but in most cases you will be able to at least recognize other ISPs. If your mail is through Yahoo and you see "juno.com" in the mix, then you know that you can report the spam to Juno.

When reporting spam, you will need to cut and paste the full header path into the email to give the experts the opportunity to track down the offender. To read an email header, you typically just right click on the email and then choose properties, options, or header depending on which email program you are using.

Finally, forward the spam to a number of authorities. The first would be the spammer's ISP. If you cannot tell who that may be, send the spam to your ISP. Additionally, several websites are available to help you report spam, like spamcop.net.

Second, forward the spam to the Federal Trade Commission at uce@ftc.gov. While they will not take action on your behalf, they will add the spam to a database compiled on known UCE (unsolicited commercial email).

If the spam is a "419 Scam", or Nigerian Advance Fee Fraud, fax a copy of the email and its headers to the United States Secret Service. You will know this spam when you read it ? an exiled African leader of some sort needs your help and bank account information. These scams have defrauded many and need to be taken seriously.

Now you may delete the spam.

Lewis Leake is the webmaster of emailcash.com. There you will find articles, resources, books and product reviews on eMail Marketing Strategies and Tactics. You will also find a number of articles on SPAM and how to prevent it. Get Your FREE Mini-Report emailcash.com

after renovation cleaning Glenview ..
In The News:

Foreign-owned apps secretly harvest personal data from seniors, making them prime targets for scams. Learn how to protect your privacy and stop data brokers today.
Sens. Josh Hawley and Richard Blumenthal introduce bipartisan GUARD Act to protect minors from AI chatbots through mandatory age verification and disclosure requirements.
Ghost-tapping scammers exploit wireless technology to drain accounts through small transactions, but RFID-blocking wallets and transaction alerts can protect you.
French pilot project demonstrates wireless charging roads that can deliver over 300 kilowatts of power to EVs while driving, potentially eliminating range anxiety.
YouTube's Ghost Network spreads information-stealing malware through thousands of fake videos offering cracked software, using compromised accounts and fake engagement.
Protect your privacy by disabling your smart TV microphone. Most TVs have hidden mics that listen even when voice commands are off. Learn quick steps to stop unwanted audio capture.
SessionReaper vulnerability hits Magento and Adobe Commerce stores, compromising 250+ sites in one day. Hackers steal data and hijack shopping sessions.
Master essential parental controls and digital safety tools to protect your kids online. Learn screen time limits, location settings and privacy controls every parent needs.
Cybersecurity expert shares six essential steps to protect against dark web threats, including data removal services, password managers and antivirus software.
NVIDIA GPU space mission could revolutionize cloud services by enabling orbital data centers that make apps, games and AI tools faster and more efficient.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Microsoft warns Windows 10 users face serious security risks as 90% of ransomware attacks target unsupported systems. Learn why upgrading to Windows 11 is crucial.
Nike unveils Project Amplify, revolutionary motorized shoes developed with Dephy that add powered assistance to every step for runners and walkers.
Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.

Challenge Response Spam Filters Explained

As the flood of spam increases end users are looking... Read More

5 Zero-Cost Spam Prevention Tools For All Situations!

Anyone who uses email knows what Spam is!It's annoying and... Read More

How To Stop Spam

I imagine you have seen, heard about, or already know... Read More

Spammer Stole My Email Address?

Do you get bounced, or rejected emails sent by someone... Read More

What Is Spam?

If you've been around the interenet any length of time... Read More

Do Not Spam

The temptation among internet marketers to SPAM is greater than... Read More

Junk Mail Works!

Junk mail works. Why does it work? How does it... Read More

The Definition of Spam

Spam can bring down your website faster than a speeding... Read More

Eight Quick Tips For Stopping SPAM

If you are buried in SPAM then you're not alone.... Read More

Email Spam and Phishing

It seems like the volume of email spam has doubled... Read More

Beware of the Newest Activity Online: Phishing

No. I'm not talking here about the outdoor activity enjoyed... Read More

Bayesian Spam Filters Explained

In a word Bayesian spam filters are "intelligent". Bayesian spam... Read More

How Can I Stop Getting Spam?

Are you getting too much spam? We all are, but... Read More

Sick Of Wading Through Spam?

It's a nightmare isn't it? You fire up your email... Read More

A War on SPAM: Attacking The Evil

As most small, medium and large businesses in this country... Read More

Of Spam and Sandboxes

About a month ago I had the privilege of giving... Read More

Why Is Spam Such a Problem?

Spam can be a lot more damaging than you might... Read More

Getting Back To Basics.

While we all agree that there`s way too much spamming/junk-mailing... Read More

Dont Look Spammy!

We all hate spam and get way too much of... Read More

How Spammers Fool Rule-based and Signature-Based Spam Filters

Effectively stopping spam over the long-term requires much more than... Read More

Dealing With SPAM - An E-mail Address Strategy

With SPAM being such a problem it might seem the... Read More

How to Avoid Spam Complaints in Your Emails

Spam filters are responsible for deleting a high percentage of... Read More

How to Protect Your Email ID from Spammers?

You must be one of them experiencing a lot of... Read More

Spam: The Tasteless Internet Meat of Criminals

Spam. You've all heard of the crazy pink meat in... Read More

How Spammers Fool Bayesian Filters - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

no-contract cleaning service Lincolnshire ..