Feeds

Bill Gates tops email hoax list

Unwilling daddy of useless chain mails

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Bill Gates isn't only the richest man in the world - he's also the subject of more email chain letters, virus hoaxes and scams than any other person or subject on the planet.

The Bill Gates fortune email chain letter tops a list of hoaxes compiled by AV vendor Sophos. Despite the frankly ludicrous claim that the Microsoft's chairman is prepared to share his wealth with anyone who forwards the email to a friend, the hoax (below) is still in active circulation after first appearing on the Net more than a year ago:

Dear Friends,

Please do not take this for a junk letter. Bill Gates is sharing his fortune. If you ignore this you will repent later. Microsoft and AOL are now the largest Internet companies and in an effort to make sure that Internet Explorer remains the most widely used program, Microsoft and AOL are running an e-mail beta test.

When you forward this e-mail to friends, Microsoft can and will track it (if you are a Microsoft Windows user) for a two week time period. For every person that you forward this e-mail to, Microsoft will pay you $245.00, for every person that you sent it to that forwards it on, Microsoft will pay you $243.00 and for every third person that receives it, you will be paid $241.00.

Within two weeks, Microsoft will contact you for your address and then send you a cheque.

Surrreee.

Graham Cluley, senior technology consultant for Sophos Anti-Virus, comments: "Obviously emails like this are nonsense, and should be deleted by computer users rather than forwarded on to their friends, family and colleagues."

Users are advised to always check their anti-virus vendor's Web site when they receive a possible hoax email. Independent resources such as Vmyths.com also provide a useful first port of call.

Lack of funds, and a military call up for Vmyths.com editor Rob Rosenberger, mean Vmyths is highly unlikely to be updated in the immediate future but an archive of the site will remain online. ®

Related Stories

Microsoft declares war on spam - Bill hates email hoaxes and scams too
VX writers release sequel to infamous Sobig worm (bill@microsoft virus)
RSPCA in censorship crusade against humour site (Bonsai Kitten hoax)
Hoax virus alert could cripple Windows Java (the infamous JDBGMGR.EXE hoax)

Top three mobile application threats

More from The Register

next story
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Bose says today is F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Joe Average isn't worth $10 a year to Mark Zuckerberg
The Social Network deflates the PC resurgence with mobile-only usage prediction
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.