Like what you've read?

On Line Opinion is the only Australian site where you get all sides of the story. We don't
charge, but we need your support. Here�s how you can help.

  • Advertise

    We have a monthly audience of 70,000 and advertising packages from $200 a month.

  • Volunteer

    We always need commissioning editors and sub-editors.

  • Contribute

    Got something to say? Submit an essay.


 The National Forum   Donate   Your Account   On Line Opinion   Forum   Blogs   Polling   About   
On Line Opinion logo ON LINE OPINION - Australia's e-journal of social and political debate

Subscribe!
Subscribe





On Line Opinion is a not-for-profit publication and relies on the generosity of its sponsors, editors and contributors. If you would like to help, contact us.
___________

Syndicate
RSS/XML


RSS 2.0

Dangerous email messages

By David Balaban - posted Thursday, 31 December 2020


Spyware

With the help of spyware, criminals obtain information about the user's actions. A typical example is a keylogger. It is designed to track keystrokes. Obviously, with the help of a keylogger, malefactors can get logins, passwords, etc.

Adware

Advertisement

The adware usually causes annoying pop-ups, page redirectsand other ads. Adware is used to profit from advertising.

How to identify malicious attachments?

Most modern mail services and antivirus tools seek to protect their users from hacker attacks and use different filters and rules. Most emails with malicious attachments do not reach the end-user. Nevertheless, using various tricks, attackers bypass security systems and deliver malicious messages to addressees. In order not to become another victim of a cybercriminal, users need to be very attentive.

As a rule, attackers try to provoke immediate actions using headlines like "Urgent," "Past due invoice," etc. However, it is advised to act calmly, assessing the situation without haste, and adhering to the following algorithm:

  1. Take a close look at the "To" and "From" fields in the header of the letter. Is the recipient's address the same as yours? Do you know the sender? If you do not know whose email address it is, then this is most likely spam.
  2. Pay attention to the language and overall quality of the letter. Numerous spelling and grammatical errors, unclear logos should raise red flags.
  3. Be critical of urgency. If an email requires immediate action or tries to pique your curiosity, be very vigilant.
  4. Always question requests for confidential information. Do not reply to an unsolicited email asking you to enter login password details, your name, or your date of birth. Reputable services never request this information via email.
  5. Check URLs. Many of the web links used in phishing campaigns look similar to legitimate website URLs but look odd on closer inspection. If the URL is hidden in a text link, hover your mouse over it and see where the link points.
  6. Stay away from unrecognizable file types. In most cases, only a few standard file types are sent as part of business email communications. If the file looks unusual, do not open it.

Conclusion

Advertisement

Despite its age, email remains the main distribution channel for malware these days. People still click malicious links and open strange file attachments. It is advised to be vigilant and check each letter carefully. If there are doubts about authenticity, it is good to call the sender. Stick to the email verification algorithm. Business owners who want to protect their companies from unexpected losses should teach their employees the basics of information security. The weakest link in any defense is always a human.

  1. Pages:
  2. 1
  3. 2
  4. Page 3
  5. All


Discuss in our Forums

See what other readers are saying about this article!

Click here to read & post comments.

6 posts so far.

Share this:
reddit this reddit thisbookmark with del.icio.us Del.icio.usdigg thisseed newsvineSeed NewsvineStumbleUpon StumbleUponsubmit to propellerkwoff it

About the Author

David Balaban is a computer security researcher with over 10 years of experience in malware analysis and antivirus software evaluation. David runs the Privacy-PC.com project.

Other articles by this Author

All articles by David Balaban

Creative Commons LicenseThis work is licensed under a Creative Commons License.

Article Tools
Comment 6 comments
Print Printable version
Subscribe Subscribe
Email Email a friend
Advertisement

About Us Search Discuss Feedback Legals Privacy