My Account
HOME CUSTOMERS Manage Account Add a Device Download PC Matic
BUSINESS CUSTOMERS Business Login
Company
PC MATIC About Us Careers Industry Recognition Leadership
STAY UP-TO-DATE Events TechTalk Podcast Commercials
Blog
Contact Us
CUSTOMER SUPPORT Home Support Business Support
CONTACT SALES Talk to Sales
For Home
Antivirus Security
PC Matic Complete Security Award-winning protection from modern security threats, VPN wifi security, PC performance optimization and more.
PC Matic VPN Cutting-edge Virtual Private Network that keeps your information private.
Products
Antivirus PC Matic VPN Identity Protection PC Matic Privacy Support Unlimited
Threat Awareness
How PC Matic Protects You SuperShield Allowlist
For Business
Business Protection
PC Matic Pro Proactive security and remote management for advanced cyber threats.
PC Matic for SMB Simple & efficient American-made cybersecurity for small and medium-sized businesses.
Solutions
Allowlisting Script Enforcement Device Control Patch Management Remote Tools Integrations Server Security
Learn More
Resellers Affiliates Resources Case Studies
For Federal
Partners
Partner Programs
Managed Service Providers Offer simple & efficient application allowlisting with zero contracts or minimums.
Channel Partners Lets deliver next level, zero trust endpoint protection that people and organizations need, together.
Explore Partnerships
Affiliate Partners
Resources
Resources
Resource Center The best source for case studies, reports, data sheets and all of the latest digital content from PC Matic.
PC Matic Blog Stay up-to-date with the latest news around cybersecurity, scam alerts, helpful tips and more.
Knowledge Resources
Case Studies Data Sheets User Guides White Papers
Blog Resources
Business Security Home Security Cyber News Scam Alerts
Support
Customer Service
Home Support The only place for PC Matic home customers to get trusted technical support.
Business Support Premiere support for business, government, enterprise and education customers.
Learn More
Getting Started Knowledgebase Tech Support Scams Fake Virus Scam The Cyber Scam Report Town Hall Sessions
Security Tools
Password Generator Internet Speed Test What Is My IP?
Company
PC Matic
About PC Matic Learn more about how we began, and our mission to change the security industry.
Careers Grow with us and experience great employee benefits in a work from home environment.
Learn More
Industry Recognition Leadership Commercials
Stay Up-to-Date
Newsroom Blog Events TechTalk Podcast
My Account
Home Customers
My Account Add a Device Renew Subscription Download PC Matic
Business Customers
Business Login Business Support
Buy Now Buy Now Buy Now
Safe + Secure
PC Matic Complete Security
Products
Antivirus
PC Matic VPN
Identity Protection
PC Matic Privacy
Support Unlimited
Threat Awareness
How PC Matic Protects You
SuperShield Allowlist
Business Protection
PC Matic Pro
PC Matic for SMB
Solutions
Allowlisting
Script Enforcement
Device Control
Patch Management
Remote Tools
Integrations
Server Security
Learn More
Resellers
Affiliates
Resources
Case Studies
For Federal
Partner Programs
Managed Service Providers
Channel Partners
Affiliate Partners
Resource Center
All Resources
Case Studies
Data Sheets
User Guides
White Papers
Blog Resources
PC Matic Blog
Business Security
Home Security
Cyber News
Scam Alerts
Customer Service
Home Support
Business Support
Learn More
Getting Started
Knowledgebase
Tech Support Scams
Fake Virus Scams
The Cyber Scam Report
Town Hall Sessions
Tools & More
Password Generator
Internet Speed Test
What Is My IP?
PC Matic
About
Careers
Learn More
Industry Recognition
Leadership
Commercials
Stay Up-to-Date
Newsroom
Blog
Events
TechTalk Podcast
Home Customers
My Account
PC Matic App
Add a Device
Renew Subscription
Business Customers
Business Login
Business Support
Skip to content
  • Blog
  • Categories
    • Home Security
    • Business Security
    • How To
    • CyberSafe Tips & Tricks
    • CyberNews
    • Scam Alert
  • Inside PC Matic
    • Inside PC Matic
    • Awards & Recognition
    • Press Releases
    • Product Updates
  • Blog
  • Categories
    • Home Security
    • Business Security
    • How To
    • CyberSafe Tips & Tricks
    • CyberNews
    • Scam Alert
  • Inside PC Matic
    • Inside PC Matic
    • Awards & Recognition
    • Press Releases
    • Product Updates
Search
  • Language
    • English
    • Portuguese (BR)
  • Language
    • English
    • Portuguese (BR)

How Spammers Got Your Email

  • October 28, 2014
  • Bob Rankin


How did that spam find its way into your inbox and how to prevent it.–PC Pitstop.

How Spammers Got Your Email

By Bob Rankin

Spammers seem to have supernatural powers that enable them to guess email addresses accurately and quickly. But in reality, spammers harvest email addresses by pretty mundane means. You may even be contributing to the problem without realizing it. Here’s the scoop on how spammers get email addresses, and steps you can take to protect your inbox…

Is Your Email Address Vulnerable to Spammers?

It can be maddening when your email inbox gets a fresh load of spam dumped into it. Equally frustrating is when spammers spoof your address as the sender, and your friends all start asking why YOU are sending them unwanted sales pitches for dubious products. Understanding how spammers get ahold of your email address can help to prevent both of these problems.

Using web-crawling “spider” programs (not unlike the ones Google uses to index Web pages) spammers hunt down email addresses by looking for the telltale “@” symbol. Working swiftly and ceaselessly, spiders can harvest millions of email addresses automatically. To avoid being bitten by a spider, don’t put your email address on the Web. That means not posting it to online forums or personal web pages. If it’s included in online directories (school, work, clubs, etc.) ask to have it removed.

Scan the web with a Google search to see where your email address is available, and work towards becoming invisible. If you must make your email address visible in public, you can obscure your address by avoiding the “@” symbol, i.e., use “joe at blow dot com” instead, or create an image with the address instead.

Article Continued Here

Excerpt shared with permission from Bob Rankin.

Stop Responding to Threats.
Prevent Them.

Get Protected

Want to get monthly tips & tricks?

Subscribe to our newsletter to get cybersecurity tips & tricks and stay up to date with the constantly evolving world of cybersecurity.

Related Articles

Is Less Privacy & More Data Sharing the Answer?

The Cybersecurity Information Sharing Act that was recently passed by the Senate – appears to be a misguided effort to ‘do something’

Read More
November 23, 2015
how long should my password be?

Best Password Managers

The best tools for optimal password management.

Read More
October 27, 2015

10 Gadgets to Help Older PC Users

Bob Rankin recommends 10 gadgets that might help ‘seniors’ enjoy their PCs – even more.

Read More
October 13, 2015
For Home PC Matic Home Security Support Unlimited
For Business PC Matic Pro PC Matic MSP
Support Home Support Business Support
Partner Programs Become a Partner Affiliates
Company About Careers Industry Recognition Newsroom Blog
Sign-Up For Our Newsletter

© PC Matic, Inc.
All Rights Reserved.

PC Matic, Inc. BBB Business Review
Choose Region
United States Brazil
EULA Privacy Policy Terms & Conditions PC Matic Pro EULA PC Matic Pro Privacy Policy