Most of those are pretty obvious phishing attempts. It is a rare week when I don't get at least some or all of these in my spam trap:
DHL missed delivery (these have been around for a few years...)
Need to update your firewall
Need to change your Facebook password
Need to change your Myspace password
Need to change your Twitter password
Important information about your <bank name here> account
Virtually all of those are captured by my Yahoo.mail spam filter, and the ones that aren't are usually easily spotted by checking the "real" link path (don't click on the link - instead, right-click on the link, copy, and paste into Notepad to see the real path.). When you see that the path isn't "delivery@dhl.com" (like it shows in the body of the message), but instead is "delivery@dhl.com.mysecretsite.com", that is a clue!
My issue is with the companies (particularly some banks and credit unions) which aren't helping by sending out legitimate e-mails with links through third-party servicing agencies, especially for surveys or offers of new services. If a legitimate e-mail from a bank contains links through these weird third-party sites, how can you tell a valid message from a spoof?

I wrote a complaint to Union Bank on this a little over a year ago and at least they took it seriously. I got a nice response acknowledging that I had a good point, and I haven't seen them do it again.
And if anyone actually clicks on links from the sex and drugs sites, etc., well - DUH! You deserve to get hit with a virus.

As long a there are even a few people who do respond to spam, it will encourage the barrage to continue.
By the way, an interesting (if chilling) article on "spear-phishing" (very targeted phishing attacks) found that they were able to get 45-50% of targeted people to enter their company user ids and passwords into a bogus web page.
http://www.darkreading.com/blog/archives/2010/03/facebook_as_a_s.html;jsessionid=3ATUGNRCPY5GRQE1GHRSKH4ATMY32JVN One of the facets of the trick was to get a bogus site name that looked enough like the home company site name so as to convince users it was sponsored by the company. I.e., if you worked for SAIC, they might have a site "www.Benefits-SAIC.com". When users went there (after on-line discussions on Facebook), they got a login page that looked like their home company page, but after entering their company user id/password, they got "page under construction" or "page not found" errors, not realizing their real company accounts had now been compromised.
