Technology in terms you understand. Sign up for the Confident Computing newsletter for weekly solutions to make your life easier. Click here and get The Ask Leo! Guide to Staying Safe on the Internet — FREE Edition as my thank you for subscribing!

How Do I Leave Services I Didn’t Request?

//
Someone hacked into my email and signed me up for services I do not want and can’t get out of. What should I do?

There’s a good chance you haven’t been hacked at all.

How can I say that? Simple: it happens to me all the time.

All. The. Time.

Become a Patron of Ask Leo! and go ad-free!

With only an email address

Anyone with a public-facing email address — like, say, leo@askleo.com — has this problem. Anyone with an email address that is easily mis-typed does, too.

People use it to sign up for things. It could be as simple as newsletters or as complex as online games and services, and I suppose it could be as jarring as an online store.

This is why email opt-in confirmation is so important: to confirm you actually want what you’ve been signed up for.

The majority of the notifications I receive are exactly that: requests that I confirm a subscription or confirm the validity of my email address. They ask me to click a link to do so. Needless to say, I don’t click the link.

Occasionally, I’ll start getting an unwanted newsletter or periodic notification. These are from sites and services that don’t do those opt-in confirmations. I mark those as spam, because that’s exactly what they are. That an otherwise reputable newsletter allowed someone to sign me up for something I didn’t want remains their fault. I don’t know that they’re reputable (lack of email confirmation is one indication they may not be), so I’m certainly not going to click on an unsubscribe link; that could make things worse if they are a spammer.

On at least a couple of occasions, I’ve received messages requesting that I authorize my child to access some game or website. I have no children. Some child probably used my email address in place of the email address of their parent in the hopes that I’d say “OK”. I don’t. I ignore those emails.

And on rare occasions, I get notification of an order being completed or shipped that I never placed. Without email confirmation, that looks very much like spam, and I mark it as such.

An email address is all they have

That last one might make some people nervous. Some kind of online order had been placed using my email address.

But that’s all they had. They don’t have my credit card number, for example.1 In fact, they don’t have anything that really matters. At worst, they have my name and email address. As do you:

Leo A. Notenboom <leo@askleo.com>

It’s public information. It’s how people reach me.2

That I get spam on it is no surprise at all.

What to do about it

The short answer is: expect it, ignore it, and move on with your life.

As long as there’s no financial or other commitment incurred (if there is, talk to your credit card company about fraud), there’s really nothing worth doing. It’s not likely you’ve been as exposed as you seem to feel you have been.

Particularly if it’s just limited to email notifications, ignore, or mark spam as spam, and carry on.

If you found this article helpful you'll love Confident Computing! My weekly email newsletter is full of articles that help you solve problems, stay safe, and increase your confidence with technology.

Subscribe now, and I'll see you there soon,

Leo

Podcast audio

Play

Video Narration

Footnotes & References

1: If it was a spammer, they would not alert me to its use by causing email to get sent to me; they’d hide their use as long as possible.

2: Since that email address is posted publicly, it gets a higher-than-average amount of spam and other “stuff”. As a result, it’s processed by my assistant as well as spam filters. I have personal email address(es) that don’t get the same visibility, but still experience a lower level of the various things discussed in this article.

Posted: April 17, 2020 in: Security
Shortlink: https://askleo.com/121684
« Previous post:
Next post: »

New Here?

Let me suggest my collection of best and most important articles to get you started.

Of course I strongly recommend you search the site -- there's a ton of information just waiting for you.

Finally, if you just can't find what you're looking for, ask me!

Confident Computing

Confident Computing is the weekly newsletter from Ask Leo!. Each week I give you tools, tips, tricks, answers, and solutions to help you navigate today’s complex world of technology and do so in a way that protects your privacy, your time, and your money, and even help you better connect with the people around you.

The Ask Leo! Guide to Staying Safe on the Internet – FREE Edition

Subscribe for FREE today and claim your copy of The Ask Leo! Guide to Staying Safe on the Internet – FREE Edition. Culled from the articles published on Ask Leo! this FREE downloadable PDF will help you identify the most important steps you can take to keep your computer, and yourself, safe as you navigate today’s digital landscape.



My Privacy Pledge

Leo Who?

I'm Leo Notenboom and I've been playing with computers since I took a required programming class in 1976. I spent over 18 years as a software engineer at Microsoft, and after "retiring" in 2001 I started Ask Leo! in 2003 as a place to help you find answers and become more confident using this amazing technology at our fingertips. More about Leo.

5 comments on “How Do I Leave Services I Didn’t Request?”

  1. I use my name and family name for my gmail account. Guess what ? There are many other persons who share my name and family name in France and Canada who also have gmail accounts based on their name. So, I frequently get correspondence intended for them. Some of it is from friends and family, some of it is confidential professional communication, some are for their cell phone service and some are subscription confirmation.

    For those from friends, family and work, I notice them of the error. The rest I simply delete.

    [Name edited as it would reveal the commenter’s email address.]

    Reply

Leave a reply:

Before commenting please:

  • Read the article.
  • Comment on the article.
  • No personal information.
  • No spam.

Comments violating those rules will be removed. Comments that don't add value will be removed, including off-topic or content-free comments, or comments that look even a little bit like spam. All comments containing links and certain keywords will be moderated before publication.

I want comments to be valuable for everyone, including those who come later and take the time to read.