Archives - Email Phishing

Beware the bait – email traps and tricky links

Ever get an email that seems a little too good to be true? Maybe it promises a surprise photo or warns of some urgent online danger. Hold on! These sneaky emails might be laced with malware, just waiting to infect your device. Here’s how to be a champion email skeptic: By being cautious and questioning […]

Email attachments and links: proceed with caution

Ever receive an email with an attachment or link that seems too good to be true? It might be. Malicious actors often use emails to spread malware, the digital boogeyman that can infect your device. Just like you wouldn’t open a random package on your doorstep, don’t click on suspicious links or open unknown attachments, […]

Disable auto downloading of graphics in HTML email

Countless spammers send HTML mail with a linked graphic file that is then used to track who reads the mail message. When your mail client downloads the graphic from their web server, the spammers know you’ve opened the message. Disabling HTML mail completely and viewing messages in plain text can also avoid this issue.

Look out for fake coupons in emails

Lots of phishing scams include the phisher posing as a major retailer and then sending emails claiming to contain coupons that you redeem by clicking them in an email. To stay safe, never click on one of these offers if it seems to good to be true, comes from a long/garbled email address, or is contained in […]

The most common ways to contract computer viruses

Like biological viruses, computer viruses spread in highly specific ways. Just as influenza infects people via airborne droplets containing virions the body’s immune systems can’t stop, malware takes over computing devices by bypassing their defenses. In other words, viruses don’t come out of nowhere, and with the right preparations it’s possible to contain them before they cause […]

Tell Gmail you only want to see certain images

It might sound like a small point, but the images you’re sent via email – even just a logo or profile picture loading up – can help hackers determine whether you’ve opened the message, setting you up for more spam or phishing. That’s why it’s useful to make images a requested element of your communications. […]