[Resolved] Reader's Digest <promotionssigntimesjobs.com> — i got a promotional email for Rs.35,00,000.00 so please let me if this is fake mail or not | |||
Please let me know the below mail is fake or not, if this is fake how can he sent mail from official web site of timesjobs. Readers Digest <[protected]@timesjobs.com> Wed, Dec 14, 2011 at 10:16 AM Reply-To: [protected]@timesjobs.com To: arreddy.[protected]@gmail.com Reply | Reply to all | Forward | Print | Delete | Show original External images are not displayed. Display images below - Always display images from [protected]@timesjobs.com If you are unable to view this mailer, please click here Reader's Digest India NOTICE OF SELECTION You are a potential finalist to win Rs. 35,00,000.00 cash in the third and last stage of Rupees One Crore Sweepstakes 2011. Dear Adla Rajashekar, An Official Invitation has been issued in your name. It confirms that you are amongst those selected from the whole of India, who may activate an exclusive Sweepstakes entry opportunity. If you are drawn winner of our Grand Prize, you’d have sole claim to a cash amount worth Rs. 35,00,000.00. You may be surprised to know that in all of India, less than 1% of the households have been selected to receive a fabulous offer from Reader's Digest. While many of your neighbours will never be selected, you have already been fortunate enough to clear two of the three stages there are to becoming a winner in our Rupees One Crore Sweepstakes 2011! Now it’s all up to you to make the most of your opportunity. Simply click here to access the private web site to activate your Sweepstakes entry opportunity. You’ll be pleased you did. Sincerely, J Mathews Director Sweepstakes Reader's Digest P.S. When people receive a Sweepstakes invitation -- like the one you now have -- they often decide to discard it, thinking, no one ever really wins. And it is a fact that if you choose to ignore the chance to enter the Rupees One Crore Sweepstakes 2011, you will never win anything in the Draw. Don't let this guaranteed opportunity slip away, just click here to access the site and you could win Rs. 35,00,000.00. Act quickly! * Reader's Digest will send you emails from time to time, to inform you about our latest activities and promotions, because we value you as our customers. However, you may discontinue this at any time - just send an email to [protected]@intoday.com with the subject header <Unsubscribe> and we will remove you from our emailing list promptly. Important Note & Disclaimer : Subject contest scheme is wholly/completely managed and sponsored by Reader's Digest Books & Home Entertainment (I) Private Limited and its magazine licencee, Living Media India LTD. and the publisher of this advertisement/scheme/e-mailer and its digital agency are in no way responsible for the same in any manner whatsoever. All communication and queries claims regarding the subject contest and scheme may please be directed to Reader's Digest, A-61, Sector 57, Noida -- 201301 India with no recourse and liability to the publisher of this advertisement/scheme/e-mailer and its digital agency. You have received this mail because you are a registered user of TimesJobs.com To Unsubscribe click here. Please do not reply to this mail. Please mark all your queries/responses to: [protected]@timesgroup.com Was this information helpful? | |||
Aug 13, 2020 Complaint marked as Resolved | |||
3 Comments | |||
Comments
Same in for mail Received on 18/1/2012, but I have no any idea what I can do so please help me
Reply
Yes it is fake.. i used the link to subscribe. I thought since it was times jobs and also since i was going to subscribe anyway to readers digest, might as well go for it. i used the postal cash on delivery option. So they sent a bunch of random books took my money. But i haven't received any readers digests.
This is know is Phishing
Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware.[1] Phishing is typically carried out by e-mail spoofing[2] or instant messaging, [3] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, [4] and exploits the poor usability of current web security technologies.[5] Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.
A phishing technique was described in detail in 1987, and (according to its creator) the first recorded use of the term "phishing" was made in 1995. The term is a variant of fishing, [6] probably influenced by phreaking, [7][8] and alludes to "baits" used in hopes that the potential victim will "bite" by clicking a malicious link or opening a malicious attachment, in which case their financial information and passwords may then be stolen.
[protected]@gmail.com
Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware.[1] Phishing is typically carried out by e-mail spoofing[2] or instant messaging, [3] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, [4] and exploits the poor usability of current web security technologies.[5] Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.
A phishing technique was described in detail in 1987, and (according to its creator) the first recorded use of the term "phishing" was made in 1995. The term is a variant of fishing, [6] probably influenced by phreaking, [7][8] and alludes to "baits" used in hopes that the potential victim will "bite" by clicking a malicious link or opening a malicious attachment, in which case their financial information and passwords may then be stolen.
[protected]@gmail.com