From FRD_SMAS.01-000069310_16044327_10@e0.monster.com Wed Aug 29 23:31:33 2007 Received: from mailman106-q0.ma.tmpw.net (mailman106-q0.ma.tmpw.net [63.112.170.32]) by www2.mrbrklyn.com (8.13.1/8.13.1/SuSE Linux 0.7) with SMTP id l7U3VQjR027051 for ; Wed, 29 Aug 2007 23:31:32 -0400 Received: (qmail 9926 invoked from network); 30 Aug 2007 03:31:15 -0000 Received: from unica102.ma.monster.com (HELO unica102) (10.50.10.22) by mailman106-q0.ma.tmpw.net with SMTP; 30 Aug 2007 03:31:15 -0000 Date: Wed, 29 Aug 2007 22:31:15 -0500 From: "Monster" Reply-To: "Monster" Subject: An Important Message to Our Valued Monster Customers To: ruben@mrbrklyn.com Mime-Version: 1.0 Message-ID: Content-Type: multipart/alternative; boundary="uaceuace.uaceuace.alt.uaceuace.uaceuace" Status: RO Content-Length: 31774 Lines: 652 Important Notice: This email is sent as a multi-part message in MIME format. If you are reading this part of the email, you may want to consider upgrading your mail reader so that you can read multi-part MIME messages. Otherwise please log in to your account and update your email preferences, so that from the next time onwards we will send you emails in the format your mail reader can understand. Sorry for the any inconvenience caused by us. --uaceuace.uaceuace.alt.uaceuace.uaceuace Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D MONSTER=20 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D Dear Valued Monster Customer,=20 Protecting the job seekers who use our website is a top=20 priority, and we value the trust you place in Monster.=20 Regrettably, opportunistic criminals are increasingly=20 using the Internet for illegitimate purposes. As is the=20 case with many companies that maintain large databases=20 of information, Monster is from time to time subject to=20 attempts to illegally extract information from its=20 database. As you may be aware, the Monster resume database was=20 recently the target of malicious activity that involved=20 the illegal downloading of information such as names,=20 addresses, phone numbers, and email addresses for some of=20 our job seekers with resumes posted on Monster sites.=20 Monster responded to this specific incident by conducting=20 a comprehensive review of internal processes and=20 procedures, notified those job seekers that their contact=20 records had been downloaded illegally, and shut down a=20 rogue server that was hosting these records. The Company has determined that this incident is not the=20 first time Monster's database has been the target of=20 criminal activity. Due to the significant amount of=20 uncertainty in determining which individual job seekers=20 may have been impacted, Monster felt that it was in your=20 best interest to take the precautionary steps of reaching=20 out to you and all Monster job seekers regarding this=20 issue. Monster believes illegally downloaded contact=20 information may be used to lure job seekers into opening a=20 "phishing" email that attempts to acquire financial=20 information or lure job seekers into fraudulent financial=20 transactions. This has been the case in similar attacks=20 on other websites.=20 We want to inform you about preventive measures you can=20 take to protect yourself from online fraud. While no=20 company can completely prevent unauthorized access to=20 data, we believe that by reaching out to job seekers like=20 you, the Company can help users better defend themselves=20 against those who have attacked Monster as well as other=20 databases. We are committed to maintaining an ongoing dialogue with=20 all of our job seekers about Internet security and the=20 steps Monster is taking to protect its job seekers. The=20 Company has placed a security alert on Monster sites=20 offering information to educate you about online fraud.=20 This information can be found at: http://e0.monster.com/emessageRMS/servlet/RMS?v=3D2&i=3D21686&t=3D000069310= &ep=3Dt9C337F31779F2CC2&xp=3Dt9C337F31779F2CC2&c=3DtFEF2B55E37C31D07824A45D= 337210422502FDA80BA565411 We have also included information on Internet safety and=20 examples of fraudulent "phishing" emails at the bottom of=20 this letter.=20 Monster has launched a series of initiatives to enhance=20 and to protect the information you have entrusted to us.=20 Some of these steps are being immediately implemented,=20 while others will be put into place as appropriate.=20 We believe these actions are the responsible steps to=20 protect the trust you place in Monster. We are also=20 working with Monster's hundreds of thousands of employer=20 customers to ensure a safe and effective online job=20 search. We will continue to share information with you=20 about the enhancements we are making as we serve as your=20 online career resource partner. We invite you to keep=20 reading to learn more about how to use the Internet=20 safely.=20 Sincerely,=20 Sal Iannuzzi=20 Chairman and CEO=20 Monster Worldwide=20 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D HOW TO BE A SAFE INTERNET USER=20 Every Internet site in the world is facing the growing=20 issue of fraudulent usage of information, and we want to=20 work with users around the world to stop this practice -=20 please keep reading to learn more about the warning signs=20 and what you can do.=20 Spam email is such a common occurrence today; you may=20 think you know what to look for. But there are two types=20 of email scams - what's known as "phishing" and "spoofing"=20 - that can be more difficult to identify. Both practices=20 concern fraudulent email where the 'from address' has been=20 forged to make it appear as if it came from somewhere, or=20 someone, other than the actual source. Below are the=20 warning signs to look for:=20 What's "phishing" all about - and how do I spot it?=20 Phishing emails are used to fraudulently obtain personal=20 identification and account information. They can also be=20 used to lure the recipient into downloading malicious=20 software. The message will often suggest there are issues=20 with the recipient's account that requires immediate=20 attention. A link will also be provided to a spoof website=20 where the recipient will be asked to provide=20 personal/account information or download malicious=20 software. Monster will never ask you to download software=20 in order to access your account or use our services.=20 How is it different than "spoofing"?=20 Spoof emails often include a fraudulent offer of=20 employment and/or the invitation to serve as a go-between=20 for payment processing or money transfers. This scam is=20 primarily directed at a general audience, but it can also=20 reach Monster members who have included contact=20 information on their resumes. Like with phishing emails,=20 the sender's address is often disguised.=20 Examples of fraudulent email:=20 These examples of fraudulent email show you what to watch=20 out for (click to see details):=20 Example 1:=20 http://help.monster.com/besafe/email/example1/=20 Example 2:=20 http://help.monster.com/besafe/email/example2/ Example 3:=20 http://help.monster.com/besafe/email/example3/ Example 4:=20 http://help.monster.com/besafe/email/example4/ Example 5:=20 http://help.monster.com/besafe/email/example5/ =20 Consumer Advice: How to Avoid Phishing Scams=20 The number and sophistication of phishing scams sent out=20 to consumers is continuing to increase dramatically. While=20 online banking and e-commerce is very safe, as a general=20 rule you should be careful about giving out your personal=20 financial information over the Internet. The Anti-Phishing=20 Working Group has compiled a list of recommendations that=20 you can use to avoid becoming a victim of these scams.=20 - Be suspicious of any email with requests for personal=20 financial information. =20 - Phishers typically include upsetting or exciting (but=20 false) statements in their emails to get people to react=20 immediately. =20 - They typically ask for information such as usernames,=20 passwords, credit card numbers, social security numbers,=20 date of birth, etc. =20 - Don't use the links in an email, instant message, or=20 chat to get to any web page if you suspect the message=20 might not be authentic. =20 - Instead, call the company on the telephone, or log onto=20 the website directly by typing in the Web address in your=20 browser. =20 - You should only communicate information such as credit=20 card numbers or account information via a secure website=20 or the telephone. =20 - Always ensure that you're using a secure website when=20 submitting credit card or other sensitive information via=20 your Web browser. =20 Additional consumer advice is available at:=20 http://www.antiphishing.org/consumer_recs.html If you have more questions, please visit:=20 http://e0.monster.com/emessageRMS/servlet/RMS?v=3D2&i=3D21686&t=3D000069310= &ep=3Dt9C337F31779F2CC2&xp=3Dt9C337F31779F2CC2&c=3DtFEF2B55E37C31D07824A45D= 337210422502FDA80BA565411 Contact us at http://www.monster.com/contact. =20 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D Monster respects your online time and privacy. This is a=20 service-related email to notify you of important account=20 information.=20 Questions? Email us directly by visiting=20 http://www.monster.com/contact/. Please do not reply to=20 this email.=20 To read the Monster Privacy Commitment, visit=20 http://about.monster.com/privacy/=20 Monster, 5 Clock Tower Place, Suite 500, Maynard, MA 01754=20 Add monster@e0.monster.com to your address book to ensure=20 delivery of Monster emails. --uaceuace.uaceuace.alt.uaceuace.uaceuace Content-Type: text/html; charset="ISO-8859-1" Content-Transfer-Encoding: quoted-printable =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20
=20 =20 =20 =20 =20 =20
3D""3D"Monster"
=20
=3D""
=20 =20 =20 =20 =20 =20
=3D""=20 =20 Dear Valued Monster Customer,
=20
=20 Protecting the job seekers who use our website is a top priority, and w= e value the trust you place in Monster. Regrettably, opportunistic criminal= s are increasingly using the Internet for illegitimate purposes. As is the = case with many companies that maintain large databases of information, Mons= ter is from time to time subject to attempts to illegally extract informati= on from its database.
=20 3D""
=20 As you may be aware, the Monster resume database was recently the targe= t of malicious activity that involved the illegal downloading of informatio= n such as names, addresses, phone numbers, and email addresses for some of = our job seekers with resumes posted on Monster sites. Monster responded to = this specific incident by conducting a comprehensive review of internal pro= cesses and procedures, notified those job seekers that their contact record= s had been downloaded illegally, and shut down a rogue server that was host= ing these records.
=20 3D""
=20 The Company has determined that this incident is not the first time Mon= ster's database has been the target of criminal activity. Due to the signi= ficant amount of uncertainty in determining which individual job seekers ma= y have been impacted, Monster felt that it was in your best interest to tak= e the precautionary steps of reaching out to you and all Monster job seeker= s regarding this issue. Monster believes illegally downloaded contact infor= mation may be used to lure job seekers into opening a "phishing" email that= attempts to acquire financial information or lure job seekers into fraudul= ent financial transactions. This has been the case in similar attacks on ot= her websites.
=20 3D""
=20 We want to inform you about preventive measures you can take to protect= yourself from online fraud. While no company can completely prevent unauth= orized access to data, we believe that by reaching out to job seekers like = you, the Company can help users better defend themselves against those who = have attacked Monster as well as other databases.
=20 3D""
=20 We are committed to maintaining an ongoing dialogue with all of our job= seekers about Internet security and the steps Monster is taking to protect= its job seekers. The Company has placed a security alert on Monster sites = offering information to educate you about online fraud. This information ca= n be found at http://help.monster.c= om/besafe/. We have also included information on Internet safety and ex= amples of fraudulent "phishing" emails at the bottom of this letter.
=20 3D""
=20 Monster has launched a series of initiatives to enhance and to protect = the information you have entrusted to us. Some of these steps are being imm= ediately implemented, while others will be put into place as appropriate.=20 3D""
=20 We believe these actions are the responsible steps to protect the trust= you place in Monster. We are also working with Monster's hundreds of thou= sands of employer customers to ensure a safe and effective online job searc= h. We will continue to share information with you about the enhancements we= are making as we serve as your online career resource partner. We = invite you to keep reading to learn more about how to use the Internet safe= ly.
=20 3D""
=20 Sincerely,
=20
=20 3D"Signature"=
=20 Sal Iannuzzi
=20 3D""
=20 Chairman and CEO
=20 3D""
=20 Monster Worldwide
=20 3D""
=20 HOW TO BE A SAFE INTERNET USER
=20 3D""
=20 Every Internet site in the world is facing the growing issue of fraudul= ent usage of information, and we want to work with users around the world t= o stop this practice - please keep reading to learn more about the warning = signs and what you can do.
=20 3D""
=20 Spam email is such a common occurrence today; you may think you know wh= at to look for. But there are two types of email scams - what's known as "p= hishing" and "spoofing" - that can be more difficult to identify. Both prac= tices concern fraudulent email where the 'from address' has been forged to = make it appear as if it came from somewhere, or someone, other than the act= ual source. Below are the warning signs to look for:
=20
=20 What's "phishing" all about – and how do I spot it?
=20 3D""
=20 Phishing emails are used to fraudulently obtain personal identification= and account information. They can also be used to lure the recipient into = downloading malicious software. The message will often suggest there are is= sues with the recipient's account that requires immediate attention. A link= will also be provided to a spoof website where the recipient will be asked= to provide personal/account information or download malicious software. Monster will never ask you to download software in order to access yo= ur account or use our services
.
=20 3D""
=20 How is it different than "spoofing"?
=20 3D""
=20 Spoof emails often include a fraudulent offer of employment and/or the = invitation to serve as a go-between for payment processing or money transfe= rs. This scam is primarily directed at a general audience, but it can also = reach Monster members who have included contact information on their resume= s. Like with phishing emails, the sender's address is often disguised.
= =20 3D""
=20 Examples of fraudulent email:
=20 3D""
=20 These examples of fraudulent email show you what to = watch out for (click to see details):
=20 3D""
=20 3D"Exampl==20 3D"Exampl==20 3D"Exampl==20 3D"Exampl==20 3D"Exampl=
=20
=20 Consumer Advice: How to Avoid Phishing Scams
=20 3D""
=20 The number and sophistication of phishing scams sent out to consumers i= s continuing to increase dramatically. While online banking and e-commerce = is very safe, as a general rule you should be careful about giving out your= personal financial information over the Internet. The Anti-Phishing Workin= g Group has compiled a list of recommendations that you can use to avoid be= coming a victim of these scams.
=20 3D""
=20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20 =20
=20 3D""
=20 3D""=20
=20 =20 Be suspicious of any email with requests for personal financial info= rmation.=20
=20 3D""
=20 3D""=20
=20 =20 Phishers typically include upsetting or exciting (but false) stateme= nts in their emails to get people to react immediately.=20
=20 3D""
=20 3D""=20
=20 =20 They typically ask for information such as usernames, passwords, cre= dit card numbers, social security numbers, date of birth, etc.=20
=20 3D""
=20 3D""=20
=20 =20 Don't use the links in an email, instant message, or chat to get to = any web page if you suspect the message might not be authentic. =20
=20 3D""
=20 3D""=20
=20 =20 Instead, call the company on the telephone, or log onto the website = directly by typing in the Web address in your browser.=20
=20 3D""
=20 3D""=20
=20 =20 You should only communicate information such as credit card numbers = or account information via a secure website or the telephone.=20
=20 3D""
=20 3D""=20
=20 =20 Always ensure that you're using a secure website when submitting cre= dit card or other sensitive information via your Web browser.=20
=20 3D""
=20 Additional consumer advice is available at = http://www.antiphishin= g.org/consumer_recs.html.
=20 3D""
=20 If you have more questions, please visit http://help.monster.com/besafe.
=20 3D""
=20 Contact us at http://www.monster= .com/contact.
=20
=20
=20



=20 =20 =20 =20 =20 =20 =20

Monster respects your online = time and privacy. This is a service-related email to notify you of importan= t account information.=20
=20
=20 Questions? Email us directly by visiting http://www.monster.com/contact/. Please do not reply to this email.
=20
=20 To read the Monster Privacy Commitment, visit
http://about.monster.com/privacy/=
=20
=20 Monster, 5 Clock Tower Place, Suite 500, Maynard, MA 01754
=20
=20 Add monster@e0.monster.com to your address book to ensure delivery of Monst= er emails. =20
=20 --uaceuace.uaceuace.alt.uaceuace.uaceuace--