From another site, extract:

Who would do such a thing? The same sort of people who have perpetuated some of the top urban legends such as the claim that Mr. Rogers had a former secret career as a trained assassin, and that ATM users can quickly contact police in the event of an attempted robbery by entering their PIN in reverse. The cyberspace is full of lies disguised as inspiration, political alerts, health warnings, and prayers. Many come complete with enhanced photographs. The ones that are especially ironic are those that state, “Even Snopes has confirmed this,” along with a link to Snopes that attributes it as false. People who forward such emails, obviously do not check the link themselves. (source: To Forward or Not to Forward? By Patti Maguire Armstrong

Akbani Informatics: A full-service consultancy for training, and information management. For Information services, Research, Content management, Training, Human Resources, Helpful Advice & Related Services Visit  

Forwarded Emails

Sunday, October 6, 2013

Will Bill Gates pay you if you forward an email?

We always get these fwd emails:

For understanding about such forwarded emails, see Cyber Crimes  by G. Ram Kumar

Description: Will Bill Gates pay you if you forward an email? Is a great fortune of millions of dollars awaiting you in an African country? Do you get mails announcing that you have won a bumper lottery? Con men of the cyber space use these tricks to catch their gullible victims. Net users usually rise to the bait and part with critical information like passwords, bank details, etc. A new breed of crooks, cyber criminals, lurks over the Internet conning unsuspecting users out of their money and personal information.
Ram Kumar’s Cyber Crimes comes as a timely alert for both experienced users of the net and those who are new to it. Written in a clear language for every user of the Internet, Cyber Crimes will help you understand the evil forces of the cyberspace and be on your guard. The SAFE INTERNET COMPUTING GUIDE provides useful dos and don’ts for your safety in your cyber journey.

Cyber crimes • Junk Mail - Spam & Spim • Online Frauds - Scams, Phishing Attacks & Urban Legends • Malware I - Viruses, Worms & Trojans • Malware II - Cookies, Adware, Spyware & Scumware • Identity Theft - Spoofing, Forgery & Social Engineering • Password Cracking & Hostile Profiling • Computer/Network Intrusions - Hacking & DoS Attacks • Cyber Squatting, Software Piracy & Copyright Infringement • Cyber Stalking & Digital Bullying • Cyber Terrorism & Cyber Warfare • Safe internet computing guide • Tips for Online Security • Blocking Spam • Guarding against Spim • Handling Scams & Phishing Attacks • Protecting yourself from Pharming Attacks • Containing Viruses & Trojans • Clearing Cookies, Adware & Spyware • Avoiding Identity Thefts • Tips for Choosing a Secure Password • Reporting Hacking Attempts • Dealing with Cyber Stalking • Online Auction Frauds • Safe Online Shopping • Safe Online Chatting• Email Account Privacy • Safe Net Banking •Endspeak • Virus Message • Nigerian Scam Message • Phishing Scam Message • Urban Legend Email • Social Engineering • Dumpster Diving • Key Internet Usage Statistics -- source

No comments: