Here's how you can avoid some of the tricks spammers use to get your email address.
Common Spammer Tactics
How do spammers get my address?
People feel it is getting worse, and they want to know why. Spammers are employing more advanced tactics and getting more aggressive in their spamming techniques. To understand how to stop spam, you should learn some of the tricks that spammers use to gain access to your Inbox.
Dictionary attacks:
The spammer takes a "dictionary" of common words and names, combines them, and sends email addressed to all different variations such as [email protected], [email protected], [email protected].
Spammers typically do this at leading email providers that have a large base of users.
Email spoofing:
The spammer trick of choice these days, email spoofing, uses a faked email header that makes an email message look like the message came from someone or somewhere other than the spammer. It's fairly easy to make an email appear that it's sent from your own address or a seemingly credible source. Spammers use spoofing to get you to open and respond to their mail. Remember, you should never respond to unsolicited email.
Social engineering:
This ploy tricks users into opening the spam by pretending to know the person or trying to lure the person with a "personal" subject line. Typical subject lines include "Hey how are you?," "Urgent and Confidential," "We need to meet," "I have money for you," or "It snowed again." Avoid this trick by never responding to unsolicited email, reporting it by clicking the "Spam" button, and setting up blocked addresses.
Mining message boards and chat rooms:
Do not post your email address in public places -- treat it like you would your phone number. If your email address appears on a message board, in a chat room, or any public place, spammers can use automated robots, or "bots," to search the Internet and grab your email address.
Open proxy, third-party servers:
Open proxies are third-party servers that allow spammers to send mail while hiding their true identities and Internet locations (IP addresses). Many spammers use these open proxy servers to help maintain anonymity.
Web beacons:
An email may contain an image that is invisible to the recipient -- this is sometimes called an "invisible GIF" or "web beacon." Once the email is opened, the spammer is alerted that your address is "live."
Inserting random strings of text and characters:
To try and get through spam-control filters, spammers will insert random strings of text throughout the email to make the spam appear unique from other email. Sometimes they do this with email headers by adding spaces and characters like this: V_I_A_G_R_A. You can help fight this type of spam by not opening or responding to it and by reporting email abuse via the "Spam" button.
Chain Letters:
Many of us receive chain letters that invite you to forward the message on to your friends. Sometimes it will say you will get five cents for every email or bad luck if you send to less than five people. These are hoaxes created to promote spam. Never forward these emails thinking you will receive money for each recipient of their email.