Feeds

Lads from Lagos recruit Kofi Annan

Oil for food generates $250m

Seven Steps to Software Security

We've said it before and we'll say it again: 419 emails are like number 12 buses - you wait ages for one and then loads turn up at once.

Yes indeed, we were delighted to learn yesterday that the late Dennis Thatcher had bequeathed us 950,000 quid, but it just gets better and better. No sooner had we fired off an email to claim that unexpected bounty, than this turned up:

From: "annakofiatun005@go.com" <annakofiatun005@go.com>
Date: 9 November 2005 10:01:47 GMT
Subject: CONFIDENTIALITY.
Reply-To: "annakofiatun005@go.com" <annakofiatun005@go.com>

I Dr. Kofi Annan, Secretary-General of the United Nations, would like to ask your partnership in reprofilling funds over $250m in excess, the funds would be coming via a string of selected banks in Europe and Asia. The Funds in question were generated by me during the oil for food program in Iraq. I have been getting scandals/ controversy in this regards, you can read more on the links below-
http://www.wsws.org/articles/2005/apr2005/anna-a05.shtml
http://www.canadafreepress.com/2003/main042803.htm

You would be paid 5% as your management fee. Please do not write back directly to me via my official email address. All further correspondence should be sent to my private mail box ( kofiannan4un@o2.pl ). As soon as you indicate your interest I will give further details. Remember to treat this mail and transaction as strictly confidential. I will await your urgent correspondence via my private mail box-

Dr.Kofi Annan.
SECRETARY- GENERAL
kofiannan@un.org
www.un.org

Nice one. We make that $12.5m in commission to add to the Thatcher beneficence, making a grand total of £8,096,422.77 just for answering a couple of emails. Right, the beers are on us... ®

Seven Steps to Software Security

More from The Register

next story
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.