Hello members ...
excuse me for English language, I'll translate it when have enough time to.
I see it's important to know some information about Internet Hoaxes.
in this document I'll try to cover the following topics:
1.What Are Internet Hoaxes and Chain Letters?
2.The Risk and Cost of Hoaxes
3.How to Recognize a Hoax
4.Recognizing a Chain Letter
5.Validating a Warning
6.What to Do When You Receive a Warning
7.Why People Send Chain Letters and Hoax Messages
8.Resources What Are Internet Hoaxes and Chain Letters?
Internet hoaxes and chain letters are e-mail messages written with one purpose; to be sent to everyone you know.
A hoax is an attempt to trick an audience into believing that something false is real. Generally there is some material object involved, which is actually a forgery
The most common hoax, however, is the hoax virus. This usually consists of an email message warning recipients about a new and terribly destructive virus. It ends by suggesting that the reader should warn his or her friends and colleagues, The Risk and Cost of Hoaxes
The cost and risk associated with hoaxes may not seem to be that high, and isn't when you consider the cost of handling one hoax on one machine.
However, if you consider everyone that receives a hoax, that small cost gets multiplied into some pretty significant costs. For example, if everyone on the Internet were to receive one hoax message and spend one minute reading and discarding it, the cost would be something like:
50,000,000 people * 1/60 hour * $50/hour = $41.7 million How to Recognize a Hoax
Probably the first thing you should notice about a warning is the request to "send this to everyone you know" or some variant of that statement. This should raise a red flag that the warning is probably a hoax.
Next, look at what makes a successful hoax. There are two known factors that make a successful hoax, they are:
(1) technical sounding language.
(2) credibility by association. Recognizing a Chain Letter
Chain letters and most hoax messages all have a similar pattern. They all have three recognizable parts:
The Hook: First, there is a hook, to catch your interest and get you to read the rest of the letter.
The Threat: When you are hooked, you read on to the threat. Most threats used to warn you about the terrible things that will happen if you do not maintain the chain.
The Request: Finally, the request. Some older chain letters ask you to mail a dollar to the top ten names on the letter and then pass it on. Validating a Warning
We recommend that you DO NOT circulate warnings without first checking with an authoritative source. Authoritative sources are your computer system security administrator, your computer incident handling team, or your antivirus vendor. Real warnings about viruses and other network problems are issued by computer security response teams What to Do When You Receive a Warning
Upon receiving a warning, you should examine its PGP signature to see that it is from a real response team or antivirus organization. To do so, you will need a copy of the PGP software and the public signature of the team that sent the message.
When in Doubt, 't Send It Out.
In addition, most anti-virus companies have a web page containing information about most known viruses and hoaxes. Why People Send Chain Letters and Hoax Messages
Only the original writer knows the real reason, but some possibilities are:
•To see how far a letter will go.
•To harass another person (include an e-mail address and ask everyone to send mail, e.g. Jessica Mydek).
•To bilk money out of people using a pyramid scheme.
•To kill some other chain letter (e.g. Make Money Fast).
•To damage a person's or organization's reputation. Resources http://hoaxbusters.ciac.org/ http://en.wikipedia.org/wiki/Hoax http://www.infosec.gov.hk/english/ge...lossary_gj.htm http://www.hoax-slayer.com/about.html