My Account
HOME CUSTOMERS Manage Account Add a Device Download PC Matic
BUSINESS CUSTOMERS Business Login
Company
PC MATIC About Us Careers Industry Recognition Leadership
STAY UP-TO-DATE Events TechTalk Podcast Commercials
Blog
Contact Us
CUSTOMER SUPPORT Home Support Business Support
CONTACT SALES Talk to Sales
For Home
Antivirus Security
PC Matic Complete Security Award-winning protection from modern security threats, VPN wifi security, PC performance optimization and more.
PC Matic VPN Cutting-edge Virtual Private Network that keeps your information private.
Products
Antivirus PC Matic VPN Identity Protection PC Matic Privacy Support Unlimited
Threat Awareness
How PC Matic Protects You SuperShield Allowlist
For Business
Business Protection
PC Matic Pro Proactive security and remote management for advanced cyber threats.
PC Matic for SMB Simple & efficient American-made cybersecurity for small and medium-sized businesses.
Solutions
Allowlisting Script Enforcement Device Control Patch Management Remote Tools Integrations Server Security
Learn More
Resellers Affiliates Resources Case Studies
For Federal
Partners
Partner Programs
Managed Service Providers Offer simple & efficient application allowlisting with zero contracts or minimums.
Channel Partners Lets deliver next level, zero trust endpoint protection that people and organizations need, together.
Explore Partnerships
Affiliate Partners
Resources
Resources
Resource Center The best source for case studies, reports, data sheets and all of the latest digital content from PC Matic.
PC Matic Blog Stay up-to-date with the latest news around cybersecurity, scam alerts, helpful tips and more.
Knowledge Resources
Case Studies Data Sheets User Guides White Papers
Blog Resources
Business Security Home Security Cyber News Scam Alerts
Support
Customer Service
Home Support The only place for PC Matic home customers to get trusted technical support.
Business Support Premiere support for business, government, enterprise and education customers.
Learn More
Getting Started Knowledgebase Tech Support Scams Fake Virus Scam The Cyber Scam Report Town Hall Sessions
Security Tools
Password Generator Internet Speed Test What Is My IP?
Company
PC Matic
About PC Matic Learn more about how we began, and our mission to change the security industry.
Careers Grow with us and experience great employee benefits in a work from home environment.
Learn More
Industry Recognition Leadership Commercials
Stay Up-to-Date
Newsroom Blog Events TechTalk Podcast
My Account
Home Customers
My Account Add a Device Renew Subscription Download PC Matic
Business Customers
Business Login Business Support
Buy Now Buy Now Buy Now
Safe + Secure
PC Matic Complete Security
Products
Antivirus
PC Matic VPN
Identity Protection
PC Matic Privacy
Support Unlimited
Threat Awareness
How PC Matic Protects You
SuperShield Allowlist
Business Protection
PC Matic Pro
PC Matic for SMB
Solutions
Allowlisting
Script Enforcement
Device Control
Patch Management
Remote Tools
Integrations
Server Security
Learn More
Resellers
Affiliates
Resources
Case Studies
For Federal
Partner Programs
Managed Service Providers
Channel Partners
Affiliate Partners
Resource Center
All Resources
Case Studies
Data Sheets
User Guides
White Papers
Blog Resources
PC Matic Blog
Business Security
Home Security
Cyber News
Scam Alerts
Customer Service
Home Support
Business Support
Learn More
Getting Started
Knowledgebase
Tech Support Scams
Fake Virus Scams
The Cyber Scam Report
Town Hall Sessions
Tools & More
Password Generator
Internet Speed Test
What Is My IP?
PC Matic
About
Careers
Learn More
Industry Recognition
Leadership
Commercials
Stay Up-to-Date
Newsroom
Blog
Events
TechTalk Podcast
Home Customers
My Account
PC Matic App
Add a Device
Renew Subscription
Business Customers
Business Login
Business Support
Skip to content
  • Blog
  • Categories
    • Home Security
    • Business Security
    • How To
    • CyberSafe Tips & Tricks
    • CyberNews
    • Scam Alert
  • Inside PC Matic
    • Inside PC Matic
    • Awards & Recognition
    • Press Releases
    • Product Updates
  • Blog
  • Categories
    • Home Security
    • Business Security
    • How To
    • CyberSafe Tips & Tricks
    • CyberNews
    • Scam Alert
  • Inside PC Matic
    • Inside PC Matic
    • Awards & Recognition
    • Press Releases
    • Product Updates
Search
  • Language
    • English
    • Portuguese (BR)
  • Language
    • English
    • Portuguese (BR)

Ask Leo: That Email Looks Like Its From Me

  • May 3, 2010
  • Leo Notenboom

askleo

By Leo Notenboom

Hi,somebody is sending emails to my contacts using my email address to which
I haven’t sent. How can this be? Have I been hacked into? I do have full
internet security avg 9,could you please let me know what action to take if any
as I find this quite worrying! I have changed my password so far, but that is
all.

You should be worried.

I’m not sure that I’d say you’ve been “hacked into”, but my guess is that
your email account has indeed been compromised.

I’ll look at what likely happened, why this isn’t like other “Someone’s
sending from my email address!” kind of issues, and what steps you need to take
next.

The big clue here is that email is being sent from you to contacts
in your address book
.

“Most email programs now carefully protect against
unauthorized address book access.”

In the “old days”, that typically meant that your computer had acquired a
virus, and that virus was in turn accessing your PC’s email program and
systematically sending email to everyone in your contact list or address
book.

While that’s still a possibility – and you should absolutely make sure that
your anti-malware tools are running and up to date – it’s not nearly as common
as it once was. Most email programs now carefully protect against unauthorized
address book access.

What more likely occurred is that your email account has been compromised
– meaning that you probably have an on-line email account, free or otherwise, that
someone has gained access too. By virtue of doing so they now have access not only
to your email, but to your address book as well. It’s all too common these days to hear
of folks whose accounts have been compromised only to have all their friends
get inundated with spam, threats, malicious emails or messages that try to
impersonate you and scam your contacts out of money.

How this happened is difficult to say. It could be anything from a weak
password that’s easy to guess, to your account credentials being sniffed in an
open WiFi hotspot, to your simply having shared the account information with
someone you should not have.

For all we know, it could also be a roommate walking up to your computer
when you’re not using it and sending messages right then and there.

(And for the record, last year there was a partial account compromise at one
of the larger free email services – account credentials were stolen without the
users having done anything wrong. Same result.)

I’ve talked before about email that appears to come from you, but in fact
does not. This is different. Specifically:

  • Spam email is sent to random people you don’t know, “spoofing” the From:
    address to make it look like it comes from you when it does not. There is
    almost nothing that can be done about this.

  • Email from stolen accounts is sent to people in your address book,
    and is not spoofed at all – it really is coming from your account. It’s just
    not you sending it.

  • Is Changing Your Password Enough?

    [This post is excerpted with Leo’s permission from his Ask Leo blog.]

    Leo Notenboom has been involved in the tech industry for nearly 30 years. After retiring from an 18 year career as a Microsoft Software Engineer Leo went on to create Ask Leo!, a free web site where he answers real questions from ordinary computer users.

    FaceBook URL: Leo’s Facebook

    Twitter URL: http://twitter.com/askleo

    Stop Responding to Threats.
    Prevent Them.

    Get Protected

    Want to get monthly tips & tricks?

    Subscribe to our newsletter to get cybersecurity tips & tricks and stay up to date with the constantly evolving world of cybersecurity.

    Related Articles

    What Your Backup Isn’t For

    Understanding the limitations of image backup.

    Read More
    November 23, 2015

    Why You Must Test Your Backup

    Don’t miss this critical step in creating a reliable backup.

    Read More
    November 17, 2015

    Fixing Browser Problems

    Common troubleshooting steps for solving browser problems.

    Read More
    October 27, 2015
    For Home PC Matic Home Security Support Unlimited
    For Business PC Matic Pro PC Matic MSP
    Support Home Support Business Support
    Partner Programs Become a Partner Affiliates
    Company About Careers Industry Recognition Newsroom Blog
    Sign-Up For Our Newsletter

    © PC Matic, Inc.
    All Rights Reserved.

    PC Matic, Inc. BBB Business Review
    Choose Region
    United States Brazil
    EULA Privacy Policy Terms & Conditions PC Matic Pro EULA PC Matic Pro Privacy Policy