Message warns users not to add 27 year old Rehana from “leicister” because she is a hacker.
The claims in the message are untrue and should not be taken seriously. This “warning” is a nothing more than a newer version of a long running Internet hoax that has no basis in fact. You cannot give a hacker access to your computer simply by adding them to your contact list.
Don’t add anyone named rehana n 27 years from leicister .she is a hacker. Tell everyone on your buddy list because if someone on your buddy list adds her, she’ll be on your list too. She’ll figure out your computer ID and address. So copy and paste this message to everyone on your buddy list because if she hacks them your next. I sent to everyone on my list so please send to everyone on your list
According to this “warning” message, which circulates via various social networking websites, as well as via instant messaging and email, a person named “rehana” who is 27 years old and hails from “leicister” is a hacker who, if you add her to your contact list, can gain access to your computer as well as the computers of others on your contact list. The warning usually comes with a photograph of a young woman, presumably “rehana”.
However, the claims in this message are untrue and the warning should not be taken seriously. In fact, this is just one more in a long series of similar hoax warnings that have circulated for several years. From time to time, some prankster simply alters the name of the supposed hacker and a few other details before sending on the message, apparently in the hope of duping a whole new set of recipients. “Rehana” may well be a real person who has become the target of either a misguided joke or a more malicious attempt to discredit her. Presumably, the prankster has simply misspelled the “hacker’s” location as “Leicister” rather than “Leicester”, the English city.
The scenario described in these silly hoax messages is technically impossible. The message suggests that just adding “rehana” to your contact list will not only give the hacker access to your computer but to the computers of everyone else on your list as well. This is total nonsense. Hackers certainly do use a range of tactics to trick users into relinquishing access to their computers. Hackers might, for example, trick victims into installing trojan software that allows a computer to be controlled remotely. Or they might use a phishing attack to trick a victim into sending them personal information such as usernames and passwords, which would, of course, allow hackers to access their victim’s account. However, even the smartest hacker will not be able to hack your computer just by being added to your contact list. For a hacking attempt to be successful, some sort of file transfer or exchange of information must take place.
Last updated: 7 February 2017
First published: 25 June 2010
By Brett M. Christensen