Cyber-Crooks are using jealousy to trick you…

Bill Mullins, who maintains the blog “Tech Thoughts”, wrote a very interesting article titled, Jealous?  Cyber-crooks have your number” (see clips below). For some reason this article, by Bill, really jumped out at me due to the deceptive tactic, he points out, that cyber-crooks are using to trick people. This one is a good one and is crafted in such a way that it could even trick a seasoned computer user. I strongly encourage all my readers to read the article to protect yourself from this deceptive tactic (click on any of the links below) and to learn from Bill simple safeguards you can put into place.  It demonstrates how cyber-crooks are using a “human emotion” to trick us.  As I always say, “believe nothing and verify everything”…

clipped from

Bill Mullins’ Weblog – Tech Thoughts

Jealous? Cyber-crooks Have Your Number


Jealousy is a human emotion that surrounds us. Arguably, it is an experience with which we are all familiar.

It’s no surprise then, that Cyber-crooks are now using jealousy as a social engineering email hook, to entice potential victims to click on an email containing enclosed links which can lead to the installation of a banking Trojan on the computer.


I apologize for my frankness. I’m sorry for not being able to speak to you in person, but I can only talk to you via email and I feel obliged to notify you to open your eyes, you are being betrayed.

I know it is difficult to prove, but every picture tells a story, I’ll send you these pictures so that you can see it with your own eyes. Take care…big hug

From a good friend who is very fond of you

View photos here”

Get Clipmarks – The easiest way to email text, images and videos you find on the web.

Sent with Clipmarks




Bookmark and Share

2 thoughts on “Cyber-Crooks are using jealousy to trick you…

Add yours

  1. Thanks Rick.

    This is, without a doubt, one of the craftiest social engineering scams I have ever encountered. Not many of us, I believe, have sufficient self esteem not to seriously consider the implications of this type of email.

    A terrifying example of the escalating threats we all now face on the Internet.



  2. Bill,

    Thank you for writing the article and pointing out these “security threats” that are ever so escalating on the internet.



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Powered by

Up ↑

%d bloggers like this: