What To Do When You Get Spam

When you go to your mailbox and find pieces of junk mail mixed in with important correspondence, you throw it out. It is a mild nuisance and you probably don't even give it a second thought. Unfortunately, most people do the same when spam arrives in their inbox. They just delete it.

While that does get rid of an individual email, more needs to be done to control what can become an overwhelming problem. Liken spam to cockroaches; see one in your cabinet and you know that you likely have an infestation that needs to be dealt with swiftly.

To begin with, do not respond to the spam ? ever. There are usually two ways that spam recipients make this mistake. First is the opt-out clause that appears at the bottom of the email. It appears to be a legal statement giving you the right to remove yourself from this mailing list. Unless you legitimately authorized the company to send you mail, in which case this is not spam, do not follow this link. Most often this link is simply a way for the spammers to identify your email address as valid. Now they can sell your address to other spammers and thank you for making their work easier by continuing to send you the spam you didn't want in the first place.

The second manner in which this error occurs is when, out of total frustration, you reply to the sender with a firm statement of your disgust. This usually happens when the spam is pornographic material and despite your best efforts, keeps appearing in your inbox. Sometimes the reply will not work because the sender's email address is a fake one and it will just bounce back to you as undeliverable. Count yourself lucky because the alternative means that they now have a confirmation of your address.

Next, read the email header. The header contains the full path of computers through which the email passed to get to you. Most pieces of email pass through at least four computers ? the spammer's, their ISP, your ISP, and finally yours. Since the stated from address is usually a fake one, this is the most reliable way to track down the spammer's ISP, at the very least.

Each computer that the spam travels through will add lines to the header stating who they are, who the mail came from, and where they are sending it. Headers can seem complicated, but in most cases you will be able to at least recognize other ISPs. If your mail is through Yahoo and you see "juno.com" in the mix, then you know that you can report the spam to Juno.

When reporting spam, you will need to cut and paste the full header path into the email to give the experts the opportunity to track down the offender. To read an email header, you typically just right click on the email and then choose properties, options, or header depending on which email program you are using.

Finally, forward the spam to a number of authorities. The first would be the spammer's ISP. If you cannot tell who that may be, send the spam to your ISP. Additionally, several websites are available to help you report spam, like spamcop.net.

Second, forward the spam to the Federal Trade Commission at uce@ftc.gov. While they will not take action on your behalf, they will add the spam to a database compiled on known UCE (unsolicited commercial email).

If the spam is a "419 Scam", or Nigerian Advance Fee Fraud, fax a copy of the email and its headers to the United States Secret Service. You will know this spam when you read it ? an exiled African leader of some sort needs your help and bank account information. These scams have defrauded many and need to be taken seriously.

Now you may delete the spam.

Lewis Leake is the webmaster of emailcash.com. There you will find articles, resources, books and product reviews on eMail Marketing Strategies and Tactics. You will also find a number of articles on SPAM and how to prevent it. Get Your FREE Mini-Report emailcash.com

recurring maid service Wilmette ..
In The News:

OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.
Archer Aviation has acquired Hawthorne Airport for $126M to launch an LA air taxi network ahead of the 2028 Olympics, featuring AI-powered eVTOL operations and next-gen aviation tech.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Fake AI apps disguised as "ChatGPT" and "DALLĀ·E" are flooding app stores with dangerous malware that steals data and monitors users without detection.
Fake buyers demand specific vehicle reports from unknown sites to steal credit card information from car sellers, but warning signs can help identify these scams before paying.
Android users can now manage apps across multiple devices more easily with Google Play Store's updated remote uninstall button in the latest update.
NASA's Perseverance rover discovers shiny metallic rock on Mars that could be a meteorite from an ancient asteroid, containing high levels of iron and nickel.
Holiday scams spike during Black Friday and Cyber Monday as criminals exploit your leaked personal data. Learn how to protect yourself from fake stores and phishing.
Commerce Department proposes TP-Link router ban over Chinese security risks. Learn how this potential prohibition could affect your home network and devices.
Hyundai AutoEver America suffered a data breach affecting 2,000 current and former employees, exposing names, Social Security numbers and driver's license information.
Washington court rules automated license plate reader images are public records, even when stored by vendors like Flock Safety, setting precedent for transparency.
Fake airline texts claiming flight cancellations are targeting travelers with convincing scams. Learn how cybercriminals steal personal data and credit card info.
Discover how iOS 26's new Adaptive Power feature automatically extends iPhone battery life by learning your usage patterns and adjusting performance intelligently.
New TikTok malware campaign tricks users into running PowerShell commands that download Aura Stealer, which steals credentials and authentication tokens.
Gaia Family offers fixed upfront pricing for IVF cycles with unlimited embryo transfers and financial protection, partnering with over 100 U.S. fertility clinics.
The Jetsons Act aims to position Pennsylvania as a leader in advanced air mobility by establishing regulations for hybrid ground-air vehicles.
Fake Geek Squad invoice emails are targeting users with convincing charges and urgent phone numbers to steal personal information and money.

The Business Of Sending Spam

You all tear your hair out in frustration every time... Read More

Email Chain Letters - Harmless Fun or Not?

I'm sure I'm not the only person on the planet... Read More

How To Identify Spam

Most of us have opened our email program and found,... Read More

How to Fight Back BEFORE Youre Falsely Accused of Spam

A friend of mine received a chilling email message from... Read More

How To Stop Spam

I imagine you have seen, heard about, or already know... Read More

Of Spam and Sandboxes

About a month ago I had the privilege of giving... Read More

Spam eMails Are Not Just Annoying - They Are A Main Distributor Of Viruses

Why is someone from India, Africa, or elsewhere writing you... Read More

The Trouble With Spam Is....

Each day we all face the same challenge. Spam. It... Read More

How Can I Stop Getting Spam?

Are you getting too much spam? We all are, but... Read More

Where Did The Word Spam Come From?

We've all become familiar with the term spam. It's become... Read More

The Definition of Spam

Spam can bring down your website faster than a speeding... Read More

A War on SPAM: Attacking The Evil

As most small, medium and large businesses in this country... Read More

Stop Spam: How To Escape The Spam Hell-Hole

If you're anything like me, you're pretty sick of it,... Read More

The Fastest Delete Finger in the Midwest!

There are hundreds of thousands of people who are trying... Read More

Lockspam Free 3.0 Released!

6 August, 2004: Polesoft Inc., home of Professional anti spam... Read More

Stop Intrusive Pop-up Ads and Regain Control of Your Online Experience!

Stop intrusive pop-up ads and regain control of your online... Read More

Internet Tip of the Week: Information Overload

We receive so much information on the Internet, especially via... Read More

How to Write a Privacy Policy

A Privacy Policy can be defined as the policy under... Read More

Evict the Spammers from Your Inbox

Block Spam and Other Email Threats From Entering Your Gateway... Read More

Spamicide: Man Spammed to Death While Checking His E-mail

Death by spam is now possible with a new device... Read More

The War on Spam: Google Fights Back

Google is engaged in a war. It is a war... Read More

Winning the War On Spam

For years I didn't worry much about spam.But lately it's... Read More

How Spammers Fool Whitelists - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

Avoid, Shun, Thwart, Prevent, and then Filter Spam

Email is rapidly becoming the standard means of communication among... Read More

Invasion of the Email Snatchers

They're sneaky. And stealthy. They're quiet and mostly unobtrusive, but... Read More

last minute cleaning help Highland Park ..