American Express card is often spoofed

More so than any other credit card I have used, American Express is often spoofed. I received an email that looked like it came from Amex. I will paste it below.

Account Access Alert:

Important Alert Notification

Your Card Number Begining: 55XX

Dear Valued Client,

We have recently made some changes to make our Valued Customers happy with better security and more benefits for staying with us. All Customers are advised to Update to our new system procedures for total on-line access and benefits, All valid Card holders are to follow and comply with the given instructions below for our new system update.

By updating to our new system, You will be By passing back and forth secret information that only Valid card holders and us know, this way, you can feel protected and more secure with your on-line access. This is for our recognized Valued Users only.

All Valid Users are required to review needed information to reclude a recurrence of any future attention with card and on-line access.

To Start System update, we have attached an HTML Web Page.

Find below Attached for HTML Web Page
Download and Save it to your Personal Device Desktop
Go back to your Desktop to open the HTML Web Page
Complete System update by Filling your Information
We Thank you Valued Client for staying with us. We continue to serve you best.

American Express Cards
View Our Privacy Statement

Add Us to Your Address Book
This is a customer service e-mail from American Express. Using the spam/junk mail function may not block servicing messages from being sent to your email account. To learn more about e-mail security or report a suspicious e-mail, please visit us at We kindly ask you not to reply to this e-mail but instead contact us securely via customer service.

Copyright 2015 American Express. All rights reserved.


This was professionally designed with authentic Amex icons and photos. One of the major clues that it wasn’t Amex was a spelling mistake in the subject of the email. Of course saving the file to the desktop was also a sign that this was a hacking attempt. It makes sense that hackers would target Amex. I have seen them get used for companies more than other types of cards. So it would give a hacker a bigger payout than some random individual.

Of course I reported it to:

The 5 biggest mistakes computer users make

So to finish the series I am sharing what I have noticed is the 5 biggest mistakes computer users make. Find out what IT people do wrong, and what management does wrong.

  1. Not asking for help appropriately. This not only includes not asking late, but asking too soon, and not asking in a way that can help themselves. When people ask too soon for IT help they often find that they know the answer, or when the IT person gets back to them it has become a non-issue. This wastes time for everyone. When they ask too late, they waste their time and usually other people who are waiting on them, and this causes unnecessary frustration. A good rule of thumb would be “How long will it take to solve this computer problem, vs. asking a computer person to help me?” For most people, and given reasonably skilled IT staff, normally 90% of you should ask an IT person. There are always people who are experts with computers, and only really need IT people when it is a complex problem. Most people tend to be shy about asking for help, and instead just forget about doing that part, or try to use some kind of complicated work-around. It is funny how often people have pride in asking for help with computer things, when if they were open to being educated they could do things much easier.
  2. Using a broken computer or system. It is certainty true that the squeaky wheel gets the grease in life. People who give feedback and point out the faults in the system are normally appreciated by most IT departments. Then IT people can correct them, or find a way to work around the issue. This seems to be related to people’s fear of job security. I have noticed that employees who feel they are valued and important will willingly give feedback on broken computers/systems, and those who aren’t job secure are shy to bring up issues. It is unfortunate that broken computers/systems exist, but too often there is not enough time/budget to manage all of the technology that a company uses. Effective IT depends on the cooperation of the people who use the systems to also point out and bring to the attention of the IT staff things that are wrong so they can be fixed. Yes it is the IT staffs job to manage this, but there are always things that slip through the cracks and help is always appreciated by wise IT staff.
  3. Breaking the rules of the business/IT staff. It may be hard to accept, but the rules you might have been told for computer usage are for your benefit. Yes at times they are wrong, arbitrary or politically motivated, but they are for a purpose. The IT staff often disagree with the rules, but we are asked to enforce them. The rules exist because this is not your home computer and you don’t have the right to treat it as such. A computer is a tool, and when someone seeks to use the tool in ways that it wasn’t designed to be used, it almost always causes problems. For example, in some business people have the ability to add software to their computer. In almost every business I have been in, people who have this right almost always mess up their machines. Then they are without their machines, causing them loss productivity and costing the business money, and the IT staff has to start from scratch. It is tremendously costly to treat a computer as a personal machine for a business.
  4. Handling their computer roughly. People who have laptops are especially prone to abusing their computers. It is abuse to put a computer in a freezing or direct sunlight environment. Computers like the same temperature people do. It is abuse when people slam their computers around, or take out their abuse on their equipment. I see it very common in businesses that things like mice, keyboards are abused in all manner of ways. Accidents will always happen, but there is very little that people do to take reasonable steps to prevent accidents. For example my water bottle is in a special sealed container that is waterproof. In addition it is away from my computer. There is no chance that my laptop will ever get wet. Yet you see people who put their coffee and other things next to their keyboard or laptop without a second thought. Computers while they are cheaper than ever, still cost a business money and it is the responsibility of the worker to safeguard the tools they have been trusted with. Yes a business will buy a new one, but the hit in your reputation isn’t worth it. When it comes time for a raise, I have seen this be used as part of a review to deny a raise.
  5. Doing illegal things with their computer. I have worked at places where coworkers asked me to help them watch porn. That was a little interesting since it was a female coworker who asked. Other coworkers at other places have asked why isn’t their illegal movie file working, or why their computer acts funny after they installed a hacked program. Almost universally, if someone has done illegal activity on their computer it causes problems. So then it becomes a delicate conversation that in some companies require HR to become involved. Different companies have different tolerances for illegal behavior. Most companies will warn their users on the first offense, and then refer them to HR if it’s a second offence. It is unfortunate that where I have worked people have downloaded music, videos and programs that makes the company liable for copyright infringement. I personally have had to have discussions with people telling them that what they are doing is illegal and that if the continue to do it, there are legal consequences that can affect the company as well. When I have had these discussions 100% of people stop doing what they are doing, but it is an uncomfortable conversation to have. Please don’t put your IT staff in this position.