Spammer Stole My Email Address?

Do you get bounced, or rejected emails sent by someone else, with YOUR email address in the From line? Does it mean your computer was hacked, or a spammer has stolen your email address? Relax... this is the work of a spammer, but it does NOT indicate any security breach on your computer.

Why do spammers use MY email address?

Spammers generally don't like to poke their misshapen little heads out from under the rocks where they live, so they try to divert attention from themselves by making it look like someone else sent that "enlarge your body part" message.

It's trivially easy to spoof the From address in an email. In fact, most email software will allow you to change the From or the Reply-to address to whatever you want. Spammers use high-volume mail merge software that picks a From address at random from their database of addresses, and sometimes even the recipient address is forged.

The reason you get those bounce messages is because the spammers don't really care if some of their emails are sent to addresses that are invalid or defunct. It's all a numbers game to them. Some email servers are smart enough to look in the email headers and easily determine that the person in the From line (in this case, you) didn't really send the message. But others do not, so you get dumped on.

It's even worse when the spam *is* delivered to a valid address and that person blames YOU. In such a case, you can just explain that it was the work of an Evil Spammer who forged your address. If they give you flack, tell them to examine the Received lines in the email headers (most email programs let you view the headers if you poke around in the options) and they'll see that the source of the message was not your service provider.

This article has been reprinted from: http://www.askbobrankin.com/spammer_using_my_email_address.html

BOB RANKIN ...is a tech writer and computer programmer who enjoys exploring the Internet and sharing the fruit of his experience with others. His work has appeared in ComputerWorld, NetGuide, and NY Newsday. Bob is publisher of the internet tourbus newsletter, author of several computer books, and creator of internet tourbus. For more helpful articles and free tech support, visit internet tourbus

residential cleaning services Lincolnshire ..
In The News:

House Bill 469 would prevent AI systems from owning property, serving as executives, or gaining legal personhood in Ohio under Representative Thaddeus Claggett's proposal.
Public voter records expose retirees' personal details to election scammers who create targeted cons using names, addresses, and voting history data.
Instead of fearing what comes next with artificial intelligence, think outside the box. Here are high-earning AI jobs that don't require a computer science degree.
OpenAI CEO Sam Altman says polite words like "please" and "thank you" cost millions annually, while direct prompts may improve ChatGPT accuracy by several points.
Chattee Chat and GiMe Chat exposed intimate conversations and photos, revealing users spent up to $18,000 on AI companions before the breach.
New Instagram parental controls allow families to manage teen screen time and content limits through the Family Center with stricter safety settings.
Third-party security breach at Discord exposes sensitive user information including government IDs, highlighting cybersecurity risks from external service providers.
Survey of 1,000 students shows teens using AI for personal relationships while two-thirds of parents remain unaware of their children's AI usage.
Cybersecurity experts warn about a ShadowLeak vulnerability that weaponized ChatGPT's Deep Research agent to steal personal data from Gmail accounts through hidden commands.
Tesla's Full Self-Driving system faces federal investigation following 58 reports of crashes, with six vehicles running red lights before colliding with other cars.
The Fox News AI Newsletter brings you the latest developments on artificial intelligence, with news on OpenAI moving to soon allow erotica for adult users.
Eric Schmidt alerts that hackers can reverse-engineer AI models to bypass safety measures, citing examples like the jailbroken ChatGPT variant called DAN.
Cybercriminals exploit Microsoft Teams through impersonation, malicious links and fake profiles to gather intel and deliver ransomware to personal and work devices.
Google, Dior, Allianz and dozens of other companies lost sensitive customer data in Salesforce-related breaches affecting millions of records across multiple sectors.
Apple launches iOS 26 with new Preview app that combines document editing, PDF annotation and scanning features into one streamlined iPhone experience.
New AI road monitoring system uses sensor-embedded fabric to predict infrastructure problems, potentially reducing maintenance costs and traffic disruptions for cities.
Holiday charity scams target retirees through lookalike organization names, untraceable payment requests, and data broker information to steal donations.
The Federal Trade Commission says criminals are posing as IRS agents, law enforcement officers or other officials, often over the phone or online, to steal thousands of dollars at a time.
AI phishing scams now use voice cloning and deepfake technology to trick victims, but Kurt "CyberGuy" Knutsson reveals warning signs to watch for.
Inversion Space unveils Arc, a reusable reentry vehicle that can deliver up to 500 pounds of cargo from orbit to anywhere on Earth in under an hour.
Red flags like processing fees, urgent countdowns and requests for full Social Security numbers expose fraudulent settlement sites targeting consumers.
Comprehensive analysis of Google Maps, Waze and Apple Maps examines usability, routing accuracy, data handling and features across the top navigation platforms.
Expert analysis reveals whether wired Ethernet or wireless Wi-Fi connections are safer for home internet use, plus practical steps to secure your network from attackers.
Australian construction robot Charlotte uses sand, crushed brick and recycled glass to 3D print fireproof, floodproof homes with reduced carbon footprint.
Cybercriminals are using fake invitation emails to trick recipients into downloading malware and stealing personal information and data.

The 4 Ws of Junk E-mail

Junk e-mail or spam has become the scourge of the... Read More

I Must Be The Luckiest Person Alive! Spam

I must be the luckiest person alive! My inbox is... Read More

Fight Spam and Fortify Your Web Site with RSS

RSS is the answer to the Spam epidemic of the... Read More

Quickly Eliminate 100% of Your Junk Email

Why do so many people think I need to take... Read More

Spam The Spammer - Will It Work?

Spam is everywhere. It's the "in-box lunch meat" nobody likes,... Read More

A War on SPAM: Attacking The Evil

As most small, medium and large businesses in this country... Read More

Lockspam Free 3.0 Released!

6 August, 2004: Polesoft Inc., home of Professional anti spam... Read More

Dont Give the Spammers Your Address From Your Page

Spammers get email addresses from web pages using programs called... Read More

Getting Back To Basics.

While we all agree that there`s way too much spamming/junk-mailing... Read More

Beware of the Newest Activity Online: Phishing

No. I'm not talking here about the outdoor activity enjoyed... Read More

Get Your News Releases Through the Spam Filters in 11 Easy Steps

In today's spam-filled email world, it's sometimes VERY difficult to... Read More

Is There A National Do Not Spam List?

You may have already received a do not spam list... Read More

Corporate Email Policies Lower Unnecessary Legal and Security Risks

What comes to your mind when you think about your... Read More

SPAM: A Nutrious Food or a Waste of Time?

Unless the filters on your computer are really good, you're... Read More

Winning the War On Spam

For years I didn't worry much about spam.But lately it's... Read More

How to Write a Privacy Policy

A Privacy Policy can be defined as the policy under... Read More

I Love Spam!

What's the big deal? All you read on the internet... Read More

How To Identify Spam

Most of us have opened our email program and found,... Read More

The Fastest Delete Finger in the Midwest!

There are hundreds of thousands of people who are trying... Read More

Block Ads, Defeat Pop-Ups, and STOP Page Hijacking

You're not alone!Who hasn't surfed the web looking for information... Read More

Bayesian Spam Filters Explained

In a word Bayesian spam filters are "intelligent". Bayesian spam... Read More

Is Your Website Blacklisted?

A blacklist, as the name implies, is a list of... Read More

Email Spam and Phishing

It seems like the volume of email spam has doubled... Read More

How Spammers Fool Whitelists - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

BUSTED: Anti Spam Forces Bankrupt Super-Spammer Scott Richter

Microsoft scores one for the good guysScott Richter, the self-proclaimed... Read More

best cleaning company Highland Park ..