From another site, extract:

Who would do such a thing? The same sort of people who have perpetuated some of the top urban legends such as the claim that Mr. Rogers had a former secret career as a trained assassin, and that ATM users can quickly contact police in the event of an attempted robbery by entering their PIN in reverse. The cyberspace is full of lies disguised as inspiration, political alerts, health warnings, and prayers. Many come complete with enhanced photographs. The ones that are especially ironic are those that state, “Even Snopes has confirmed this,” along with a link to Snopes that attributes it as false. People who forward such emails, obviously do not check the link themselves. (source: To Forward or Not to Forward? By Patti Maguire Armstrong

Akbani Informatics: A full-service consultancy for training, and information management. For Information services, Research, Content management, Training, Human Resources, Helpful Advice & Related Services Visit  

Forwarded Emails

Thursday, October 24, 2013

Community Service Recognition -- Beware of Who’s Who Scams

Lovely, kind and personalized message that came in the mailbox today:
Good morning!
We wanted you to know that you received Honorable Mention in yesterday's article titled "Who's Who in Local Communities" by Stephen Bozanek, recognizing individuals and businesses who have recently contributed to improving their local communities.
The article will remain available at for the next few hours and is available for on-demand download and printing.
We wish you the best of continued success.
Lisa Davis
News Digest International

----------Yet another, received previously:
Dear Candidate, 
You were recently appointed as a biographical candidate to represent your industry in the Who's Who Among Executives and Professionals, and for inclusion into the upcoming 2008-2009 "Honors Edition" of the registry.
We are pleased to inform you that on November the 10th, your candidacy was approved. Your confirmation for inclusion will be effective within five business days, pending our receipt of the enclosed application.
The Office of the Managing Director appoints individuals based on a candidate's current position, and usually with information obtained from researched executive and professional listings. The director thinks you may make an interesting biographical subject, as individual achievement is what Who's Who is all about. Upon final confirmation you will be listed among thousands of accomplished individuals in the Who's Who Registry. There is no cost to be included.
We do require additional information to complete the selection process and kindly ask that you access this form on our website by Clicking Here
Bill Fields
Managing Director
Advise on how to 'treat' such lovely message is  by Beware of Who’s Who Scams
"If nothing jumped out at you in the above, then you need to learn more about how to identify a potential scam.
First, if what is being referred to really involved a selection process and your identification as worthy from among a larger pool of people, you would expect the e-mail to address you by name. A generic form of address indicates that this is a mass mailing, and the link offering you the opportunity to unsubscribe confirms this...."
 On the same shelf:

Sunday, October 6, 2013

Will Bill Gates pay you if you forward an email?

We always get these fwd emails:

For understanding about such forwarded emails, see Cyber Crimes  by G. Ram Kumar

Description: Will Bill Gates pay you if you forward an email? Is a great fortune of millions of dollars awaiting you in an African country? Do you get mails announcing that you have won a bumper lottery? Con men of the cyber space use these tricks to catch their gullible victims. Net users usually rise to the bait and part with critical information like passwords, bank details, etc. A new breed of crooks, cyber criminals, lurks over the Internet conning unsuspecting users out of their money and personal information.
Ram Kumar’s Cyber Crimes comes as a timely alert for both experienced users of the net and those who are new to it. Written in a clear language for every user of the Internet, Cyber Crimes will help you understand the evil forces of the cyberspace and be on your guard. The SAFE INTERNET COMPUTING GUIDE provides useful dos and don’ts for your safety in your cyber journey.

Cyber crimes • Junk Mail - Spam & Spim • Online Frauds - Scams, Phishing Attacks & Urban Legends • Malware I - Viruses, Worms & Trojans • Malware II - Cookies, Adware, Spyware & Scumware • Identity Theft - Spoofing, Forgery & Social Engineering • Password Cracking & Hostile Profiling • Computer/Network Intrusions - Hacking & DoS Attacks • Cyber Squatting, Software Piracy & Copyright Infringement • Cyber Stalking & Digital Bullying • Cyber Terrorism & Cyber Warfare • Safe internet computing guide • Tips for Online Security • Blocking Spam • Guarding against Spim • Handling Scams & Phishing Attacks • Protecting yourself from Pharming Attacks • Containing Viruses & Trojans • Clearing Cookies, Adware & Spyware • Avoiding Identity Thefts • Tips for Choosing a Secure Password • Reporting Hacking Attempts • Dealing with Cyber Stalking • Online Auction Frauds • Safe Online Shopping • Safe Online Chatting• Email Account Privacy • Safe Net Banking •Endspeak • Virus Message • Nigerian Scam Message • Phishing Scam Message • Urban Legend Email • Social Engineering • Dumpster Diving • Key Internet Usage Statistics -- source