lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Sat, 3 Mar 2007 17:31:10 +0100
From:	"PINRobot_donotreply@...old.com" <PINRobot_donotreply@...old.com>
To:	netdev@...r.kernel.org
Subject: Notification of e-gold account update 

Dear e-gold customer,

We recently reviewed your account, and suspect that your e-gold
account may have been accessed by an unauthorized third party.

Protecting the security of your account and of the e-gold network
is our primary concern. Therefore, as a preventative measure, we
have temporarily limited access to sensitive account features.

To restore your account access, please take the following steps to
ensure that your account has not been compromised:

1. Login to your e-gold account. In case you are not enrolled yet,
you will have to fill in the required information, including your
current e-gold e-mail and it's password.

2. Review your recent account history for any unauthorized
withdrawals or deposits, and check your account profile to make
sure no changes have been made. If any unauthorized activity has
taken place your account, report to e-gold staff immediately.

To get started, please click link below:
http://www.e-gold.com.acct.fr.nf

Restore your e-gold account access

We apologize for any inconvenience this may cause, and appreciate
assistance in helping us maintain the integrity of the entire
e-gold system. Thank you for your prompt attention to this matter.

Please do not reply to this automatically generated email message.



-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ