Spammer Stole My Email Address?

Do you get bounced, or rejected emails sent by someone else, with YOUR email address in the From line? Does it mean your computer was hacked, or a spammer has stolen your email address? Relax... this is the work of a spammer, but it does NOT indicate any security breach on your computer.

Why do spammers use MY email address?

Spammers generally don't like to poke their misshapen little heads out from under the rocks where they live, so they try to divert attention from themselves by making it look like someone else sent that "enlarge your body part" message.

It's trivially easy to spoof the From address in an email. In fact, most email software will allow you to change the From or the Reply-to address to whatever you want. Spammers use high-volume mail merge software that picks a From address at random from their database of addresses, and sometimes even the recipient address is forged.

The reason you get those bounce messages is because the spammers don't really care if some of their emails are sent to addresses that are invalid or defunct. It's all a numbers game to them. Some email servers are smart enough to look in the email headers and easily determine that the person in the From line (in this case, you) didn't really send the message. But others do not, so you get dumped on.

It's even worse when the spam *is* delivered to a valid address and that person blames YOU. In such a case, you can just explain that it was the work of an Evil Spammer who forged your address. If they give you flack, tell them to examine the Received lines in the email headers (most email programs let you view the headers if you poke around in the options) and they'll see that the source of the message was not your service provider.

This article has been reprinted from: http://www.askbobrankin.com/spammer_using_my_email_address.html

BOB RANKIN ...is a tech writer and computer programmer who enjoys exploring the Internet and sharing the fruit of his experience with others. His work has appeared in ComputerWorld, NetGuide, and NY Newsday. Bob is publisher of the internet tourbus newsletter, author of several computer books, and creator of internet tourbus. For more helpful articles and free tech support, visit internet tourbus

disinfecting cleaning services Winnetka ..
In The News:

Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.

Pst... Pass It On... I Found Out Its a Hoax

When you receive an email telling you about a virus,... Read More

I Must Be The Luckiest Person Alive! Spam

I must be the luckiest person alive! My inbox is... Read More

How To Identify Spam

Most of us have opened our email program and found,... Read More

What Exactly is Spam?

Spam, as defined in the context of computers, the Internet... Read More

20 Words That Kill - At Least When It Comes to Spam Filters

Spam, spam, spam. It's terrible not only for those of... Read More

Why Is Spam Such a Problem?

Spam can be a lot more damaging than you might... Read More

Do You Know Whats in Your Trash?

A hearty welcome to all the spam fighting filters and... Read More

Customers Demand Internet Privacy

... and you'd better sit up and take notice! Customers... Read More

Email Spam and Phishing

It seems like the volume of email spam has doubled... Read More

A Practical Approach to Eliminate Spam

Spam is out of control! I guess that would be... Read More

The Business Of Sending Spam

You all tear your hair out in frustration every time... Read More

Spammer in the Slammer: Jeremy Jaynes Sentenced to Nine Years

Will other spammers take heed? Don't count on it.Jeremy Jaynes... Read More

Stop Intrusive Pop-up Ads and Regain Control of Your Online Experience!

Stop intrusive pop-up ads and regain control of your online... Read More

Bayesian Spam Filters Explained

In a word Bayesian spam filters are "intelligent". Bayesian spam... Read More

Dealing With SPAM - An E-mail Address Strategy

With SPAM being such a problem it might seem the... Read More

Avoiding the Spam Trap: Get Your Message Delivered!

Your message is not being delivered.If you send emails to... Read More

Avoid, Shun, Thwart, Prevent, and then Filter Spam

Email is rapidly becoming the standard means of communication among... Read More

How Spammers Fool Rule-based and Signature-Based Spam Filters

Effectively stopping spam over the long-term requires much more than... Read More

5 Zero-Cost Spam Prevention Tools For All Situations!

Anyone who uses email knows what Spam is!It's annoying and... Read More

How To Analyze A Rip-Off Scheme

This review is taken DIRECTLY from a piece of "junk... Read More

Having a Bad e MALE Day? Email, Spam, Spam and More Spam

You just sat at your desk, opened your email account... Read More

Blackhole or Fail - Which One Is Better For Your Mail Server?

Very often SPAMMERS take advantage of catch-all email setup on... Read More

Take Back Control of Your Inbox: Eliminate Annoying and Potentially Harmful E-mails

Are you tired of spam stealing your time, your money,... Read More

I Love Spam!

What's the big deal? All you read on the internet... Read More

The Vanishing Mail

Am I Just Being Paranoid Or Are The Robots Out... Read More

last minute cleaning help Highland Park ..