Feeds

Google slips Reg reader £500k!!!!!

Really doing no evil during '10 Years Anniversary Awards'

Combat fraud and increase customer satisfaction

We've decided to give Google a break this afternoon, and have curtailed the usual Reg whining about the search monolith's dark ambitions to enslave humanity to its will, using stored search data and Orwellian black Opels.

The reason? The following astounding missive from Google Ghana. No we didn't realise Google had a Ghanaian tentacle either, but there you go:

From: windows claims <windowsclaims333@msn.com>
Subject: Google 10th Anniversary Award winner!!!!!!!!!!!
Reply-To: <windowsclaims4u@yahoo.co.th>

Google 10th Anniversary Award winner!!!!!!!!!!!
Google 10th Anniversary Awards Centre,
London W1U 4RY, United Kingdom.

We are pleased to inform you that your email address has won an Award in the Google 10 Years Anniversary Awards as organized by Google Inc., held on 0ct 6th,2008/2009. in London, United Kingdom. Google Inc. randomly selected 20 email addresses through a computer ballot system to receive an award of Five Hundred Thousand Great British Poun(500,000.00) each as a part of their for-profit philanthropic wing (GOOGLE.ORG) promotion. Awards MUST be claimed by the email owner ONLY, not later than 3 weeks from the day of notification.

Award Reference code: GOOGLE568A2008
File number: G245
Send your complete personal information with your Award Ref. and File no. to our paying Centre in Accra Ghana to enable us process your claim.

1. Full name:
2. Country:
3. Contact Address:
4. Telephone/Fax no:
5. Marital Status:
6. Occupation:
7. Sex:
8. Age:
9. Email:

Director of Operations: Mr. Ben Akambi
Paying Centre office.
Accra Ghana .
Tele/Fax :00233 054 292 47 48
Please do not reply if you are NOT the owner of this email address.
Congratulations!! Sincerely Yours,
Google Management

Interestingly, Google Ghana wisely avoids using its masters' own gmail, preferring to deploy a Redmond "windows claims" department email addy for outgoing missives and, evidently for financial security reasons, routing reply emails via Yahoo! in Thailand.

No doubt Mr Ben Akambi can provide a perfectly plausible explanation for this before slipping a whopping great cheque in the post. ®

Bootnote

Thanks to Jamie Abbott for sharing his extraordinary good fortune.

3 Big data security analytics techniques

More from The Register

next story
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
Spanish village called 'Kill the Jews' mulls rebranding exercise
Not exactly attractive to the Israeli tourist demographic
Lego is the TOOL OF SATAN, thunders Polish priest
New minifigs like Monster Fighters are turning kids to the dark side
Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine
Only I can 'make an empire out of a republic' intones presidential candidate
Chinese company counters pollution by importing fresh air
Citizens line up for bags of that sweet, sweet mountain air
Google asks April Fools: Want a job? Be our 'Pokemon Master'
Mountain View is prankin' like it's 1999...
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.