Gosh spammers are starting to work hard.
Normally you can see from the email address that it’s rubbish – for example a recent ‘linked in invitation’ was from “LinkedIn.Invitations” <83F85A3@kannenberg.g2n.de>
Bit of a giveaway.
This one though is almost to a much higher standard (headers):
Return-path: <firstname.lastname@example.org> Envelope-to: X Delivery-date: Tue, 16 Oct 2012 03:00:18 -0600 Received: from [126.96.36.199] (port=44252 helo=kol-static-20-242-16-61.direct.net.in) by XISP with esmtp (Exim 4.76) (envelope-from <email@example.com>) id 1TO309-0005p0-F1 for firstname.lastname@example.org; Tue, 16 Oct 2012 03:00:18 -0600 Received: from eleusis.dabs.com (eleusis.dabs.com [188.8.131.52]) (using TLSv1 with cipher RC4-MD5 (128/128 bits)) (No client certificate requested) by mail2.bronco.co.uk (Postfix) with ESMTP id A491CF94889 for <<X>> Tue, 16 Oct 2012 14:29:48 +0530 Received: from angelia1.intranet.dabs.com (10.200.0.175) by mail.intranet.dabs.com (10.220.0.101) with Microsoft SMTP Server (TLS) id 8.1.436.0; Tue, 16 Oct 2012 14:29:48 +0530
Especially if you know that BT own Dabs.com…
The double angle brackets around my email address (replaced with X, ISP email server with XISP) are a bit of a presentation downfall, but the long faked headers (184.108.40.206) aren’t too bad. Bronco.co.uk?