Spammer Stole My Email Address?

Do you get bounced, or rejected emails sent by someone else, with YOUR email address in the From line? Does it mean your computer was hacked, or a spammer has stolen your email address? Relax... this is the work of a spammer, but it does NOT indicate any security breach on your computer.

Why do spammers use MY email address?

Spammers generally don't like to poke their misshapen little heads out from under the rocks where they live, so they try to divert attention from themselves by making it look like someone else sent that "enlarge your body part" message.

It's trivially easy to spoof the From address in an email. In fact, most email software will allow you to change the From or the Reply-to address to whatever you want. Spammers use high-volume mail merge software that picks a From address at random from their database of addresses, and sometimes even the recipient address is forged.

The reason you get those bounce messages is because the spammers don't really care if some of their emails are sent to addresses that are invalid or defunct. It's all a numbers game to them. Some email servers are smart enough to look in the email headers and easily determine that the person in the From line (in this case, you) didn't really send the message. But others do not, so you get dumped on.

It's even worse when the spam *is* delivered to a valid address and that person blames YOU. In such a case, you can just explain that it was the work of an Evil Spammer who forged your address. If they give you flack, tell them to examine the Received lines in the email headers (most email programs let you view the headers if you poke around in the options) and they'll see that the source of the message was not your service provider.

This article has been reprinted from: http://www.askbobrankin.com/spammer_using_my_email_address.html

BOB RANKIN ...is a tech writer and computer programmer who enjoys exploring the Internet and sharing the fruit of his experience with others. His work has appeared in ComputerWorld, NetGuide, and NY Newsday. Bob is publisher of the internet tourbus newsletter, author of several computer books, and creator of internet tourbus. For more helpful articles and free tech support, visit internet tourbus

trusted cleaning company Bannockburn ..
In The News:

Apple's iOS 26.1 update delivers major security fixes, performance boosts and enhanced privacy controls for your iPhone. Discover why updating now protects your data.
Russian hackers use fake CAPTCHA tests to spread dangerous malware targeting governments and journalists. Learn how to protect yourself from these deceptive attacks.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Miami-Dade debuts America's first autonomous police SUV with AI cameras, drone deployment and real-time crime detection in groundbreaking law enforcement pilot.
Bank impostor scams cost Americans $2.9 billion as criminals use AI voices and caller ID spoofing to steal life savings. Learn nine essential fraud protection tips.
Foreign-owned apps secretly harvest personal data from seniors, making them prime targets for scams. Learn how to protect your privacy and stop data brokers today.
Sens. Josh Hawley and Richard Blumenthal introduce bipartisan GUARD Act to protect minors from AI chatbots through mandatory age verification and disclosure requirements.
Ghost-tapping scammers exploit wireless technology to drain accounts through small transactions, but RFID-blocking wallets and transaction alerts can protect you.
French pilot project demonstrates wireless charging roads that can deliver over 300 kilowatts of power to EVs while driving, potentially eliminating range anxiety.
YouTube's Ghost Network spreads information-stealing malware through thousands of fake videos offering cracked software, using compromised accounts and fake engagement.
Protect your privacy by disabling your smart TV microphone. Most TVs have hidden mics that listen even when voice commands are off. Learn quick steps to stop unwanted audio capture.
SessionReaper vulnerability hits Magento and Adobe Commerce stores, compromising 250+ sites in one day. Hackers steal data and hijack shopping sessions.
Master essential parental controls and digital safety tools to protect your kids online. Learn screen time limits, location settings and privacy controls every parent needs.
Cybersecurity expert shares six essential steps to protect against dark web threats, including data removal services, password managers and antivirus software.
NVIDIA GPU space mission could revolutionize cloud services by enabling orbital data centers that make apps, games and AI tools faster and more efficient.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Microsoft warns Windows 10 users face serious security risks as 90% of ransomware attacks target unsupported systems. Learn why upgrading to Windows 11 is crucial.
Nike unveils Project Amplify, revolutionary motorized shoes developed with Dephy that add powered assistance to every step for runners and walkers.
Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.

Junk Mail Works!

Junk mail works. Why does it work? How does it... Read More

Spam The Spammer - Will It Work?

Spam is everywhere. It's the "in-box lunch meat" nobody likes,... Read More

The Definition of Spam

Spam can bring down your website faster than a speeding... Read More

Dont Look Spammy!

We all hate spam and get way too much of... Read More

Stop Spam: How To Escape The Spam Hell-Hole

If you're anything like me, you're pretty sick of it,... Read More

The Great Spam Scam: Five Strategies To Stop Brand and Revenue Robbery

Marketers usually think of anti-spam tactics as 'how to prevent'... Read More

Spammer Stole My Email Address?

Do you get bounced, or rejected emails sent by someone... Read More

The War on Spam: Google Fights Back

Google is engaged in a war. It is a war... Read More

Sick Of Wading Through Spam?

It's a nightmare isn't it? You fire up your email... Read More

What to Do to Avoid Getting Banned

How would you feel if you found a link on... Read More

Getting Back To Basics.

While we all agree that there`s way too much spamming/junk-mailing... Read More

What Exactly is Spam?

Spam, as defined in the context of computers, the Internet... Read More

Anti Trackback and Comment Spam Methods

What is spam ? ... Read More

Are You A Spam Zombie?

Over the past few years you've all become familiar with... Read More

How Spammers Fool Spam Blacklists - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

How You Can Avoid The New Dangers Of Spam

Until recently, spam has been an annoyance, a definite load... Read More

How To Stop Spam (Especially If You?re Already a Victim)

Spam. Those annoying, time-consuming emails that clog your Inbox and... Read More

Internet Tip of the Week: Outsourcing

It's no secret that the US economy has slowed down,... Read More

E-mail SPAM: Whats The Big Deal?

It absolutely amazes me how many people over-react to receiving... Read More

Three Faces of SPAM

Like everybody who will ever read this, I get spam... Read More

Quickly Eliminate 100% of Your Junk Email

Why do so many people think I need to take... Read More

How To Analyze A Rip-Off Scheme

This review is taken DIRECTLY from a piece of "junk... Read More

Is There A National Do Not Spam List?

You may have already received a do not spam list... Read More

The Cybermagic of Whitelists

Before we start getting deep into the meat of this... Read More

Why Is Spam Such a Problem?

Spam can be a lot more damaging than you might... Read More

luxury cleaning services Lake Forest ..