Computer Hoaxes for the Beginner

by | Jun 1, 2015 | Uncategorized

Can you say, “hoax?”

With the advent of email, one person can send millions of messages. With the help of willing accomplice friends, a single hoax chain letter can multiply into hundreds of millions. There are any number of hoaxes and well-meaning people can unwittingly propagate them.

Some hoaxes are political disinformation; some are scams, some are chain letters, and some are just outdated information making the rounds again. The disinformation type are intended to hurt some public figure or company, the scams are intended to separate you from your money, the chain letters can plug up the Internet (and eventually can make your Internet access cost more), and the old information can get you to do the wrong thing.

There are two warning signs. If it seems to good too be true, it probably is (where have you heard that before?), and if it says something breathless like, “Send this to everyone on your list right away,” you probably shouldn’t. Often, these hoaxes quote people and institutions. You can call or email those people and institutions to check. Often there will be a web page mentioning the existence of the hoax, as millions of people will have received it.

I received an email from a relative last year, decrying Barbara Walter’s selection of Jane Fonda as a “Woman of the Century,” and detailing statements and actions she took at the time of the Viet Nam War. The email was a hoax that took some facts, some outright lies, and some outdated information and put them all together. Fonda did say some of the things in the early 70’s that were mentioned in the email (although she apologized on television in 1988), didn’t do many of the things mentioned, and the Walters event took place 5 years ago. Someone wanted to damage Fonda, and found an audience willing to propagate this hoax, over and over again.

The Nigerian scam has a lot of variations. The basic story is that a rich person has a fortune they need to get out of the (name your favorite politically oppressed) country and they need your help. In exchange, you get some percentage of these millions. When you reply, you get asked for your bank account number (for them to deposit the funds) and possibly a small deposit (to show your trustworthiness). People have been taken in by this scam for two decades, and more than a $100 million.

As for the email telling you that Bill Gates is giving you money for every time you forward an email — it ain’t gonna happen. It’s just a chain letter, and some versions give you a virus for your trouble.

If you aren’t sure an email you get is talking about something real, try going to one of the websites that are dedicated to exposing these hoaxes. They don’t always completely agree, so you might check a couple. In any case, they make for entertaining reading:

http://www.museumofhoaxes.com/hoaxsites.html
http://www.snopes.com/
http://www.hoaxbusters.org/
http://urbanlegends.about.com/od/virushoaxes1/
http://www.symantec.com/avcenter/hoax.html

Finally, some hoax emails exist just to send around data-damaging Trojans or viruses. They propagate via the unwitting actions of friendly emails being sent to others. They can make your data unusable, crash your computer. We can usually recover your data when the data damaged by the malignant email is needed. We have saved the day for thousands of happy clients. If you have this problem, give us a call or drop us an email.

Subscribe to our free and informative weekly forensics newsletter!

 

Related Posts

CSI Cases from Burgess Forensics #69 A Case of Hiphop Beef

The Stories are true; the names and places have been changed to protect the potentially guilty. It was almost closing time on Friday and my thoughts were turning to Barbequeing some of that mouth-watering Santa Maria tri-tip while my nose was turned to the scent of...

Email as a signed contract vs. fraudulent emails

Email as a signed contract vs. fraudulent emails We all send and receive email, but did you know that what you say in an email can be interpreted as a legal contract? And that sometimes, emails are fraudulent? Both are true. The Statute of Frauds Although email didn’t...

El Salvador Adopts BitCoin

El Salvador Adopts BitCoin copyright Steve Burgess, 2021 El Salvador just passed a law to make BitCoin (BTC) legal tender and is the first country to do so. It did something similar back in 2001, when it made the US Dollar the official currency, replacing the...

Keeping Your Bitcoin Safe

BitCoin. Everybody wants some. But what’s the best way to keep it safe once you’ve got it? And how to get it? First things first – you get BitCoin (and Etherium, and DogeCoin) from a cryptocurrency exchange, like you would from a “regular” currency exchange to turn...

Cyberbullying and Covid-19: 2021 Update

California defines a cyberbully as anyone who sends any online communication to deliberately frighten, embarrass, harass, or otherwise target another. The Cyberbullying Research Center defines it as “willful and repeated harm inflicted through the use of computers,...

Cybersecurity & Covid-19: Vulnerability and What to Do About It

Cybersecurity & Covid-19: Vulnerability and What to Do About It Steve Burgess, 2020 As if we didn’t have enough to worry about. With so many of us working from home (close to 90% of American corporations are encouraging or requiring employees to do so) and having...

Indian Summer Lovin’ – Tech Tips For a Warm Autumn

by Natalie Miller, 2019 With Indian Summer temperatures rising, here are some tips to help you make sure your devices are ready to conquer these warm days of Fall like you are. Check Those Pockets! Taking a dip in the pool, going for a paddle in a kayak, and jumping...

Electronic Waste and Recycling – What Your Old Devices Can Say About You

by Natalie Miller, 2019 With new models of phones and computers being released every year, wanting the latest and greatest is never a bad thing, but what about your old devices? The truth is that old devices can still hold all of the data you put on them or that they...

The Case of The Client Who Wanted … to be Wanted

The Case of The Client Who Wanted … to be Wanted copyright Steve Burgess, 2018 It was nearly Christmas, but the morning sun was pouring in through the windows of my Central Coast office, casting shoe-shaped shadows on the West side of my desk. Perhaps I should have...

Burgess Forensics Newsletter Vol. 5 Issue 1: FitBit Fun Forensics & Foes 08.08.2018

  Fitbit, Fun, Forensics, and Foes Have you tracked your 10,000 steps today? Has anyone else tracked them? Fitness trackers are big business, helping people get and stay fit, and helping them share their progress with friends – and sometimes with strangers. The...

Pin It on Pinterest

Share This