The Times Australia
Google AI
The Times Technology News

.

4 red flags an email might be spam

  • Written by NewsServices.com

Phishing attacks are one of the most common cybersecurity threats you can encounter online. Phishing, as defined by Cisco, is “the practice of sending fraudulent communications that appear to come from a reputable source.” Because it’s normally done through email, when we think of phishing we think of spam email. 

The end goal of a spam email is to steal sensitive information (credit card, passwords) from the user or to install malicious software (malware) on the device. Malware works by damaging computers and computer systems and can leak private information, gain unauthorised access or deprive users of access (ransomware). 

There are some scary stats out there to give you a broad idea of how much harm spam emails can cause:

  • 92.4% of malware sneaks into a device through email (2018 Verizon Data Breach Investigations Report)
  • 1 in 131 emails you open on your laptop contains malware (Symantec 2018 Internet Security Threat Report)
  • Laptop owners are vulnerable to more than 4,000 ransomware attacks that occur every day (U.S. Federal Bureau of Investigation)

The top 4 red flags an email might be spam are:

1. The email address 

The first clue that an email might be spam lies in the email address itself. Hackers may compose their spam emails to appear as if they are coming from an existing contact. 

Because we’re so used to spam filters, you are more likely to open the email and not question its contents. But the way phishing works is that hackers can fake email addresses by slightly adjusting the domain name.  

Jan Chapman, Co-Founder and Managing Director of IT Security company MSP Blueshift, explains more about how this works: “A spoofed email address can for example fake an organisation’s name by one letter. For example, instead of jan@mspblueshift, a threat actor could write jan@msppblueshift. It’s a hack that it’s very easy to be overlooked, especially by an employee in an organisation. I cannot stress enough about the importance of IT security.”

2. Urgent or threatening language

Keep in mind that real emergencies don’t happen over email. 

These types of emails normally pressure the user to respond quickly. It can either be positive: “you have won a prize, claim it NOW,” or negative “we’re taking legal action against you, respond ASAP.”

Other types of urgent messages can claim to close your account, or even that your security has been compromised. Always contact your bank provider and other services to find out if the request is real. 

3. Requests for sensitive information

A phishing email appears to originate from a trusted source – more likely one that holds sensitive data or information – for example, your bank. 

The email encourages you to divulge private and sensitive information. The request could look like this:

  • * Reply to the email
  • Go to this website to complete a form
  • Update your bank details by clicking on the link 
  • Links directing you to login pages

Remember: this isn’t common banking practice, so proceed with caution. 

4. Suspicious attachments

Email attachments make even the strong curious, but you should always make sure you’re not opening or downloading attachments that contain malware. 

Look out for:

  • Attachments you didn’t ask for
  • Weird file names 
  • Uncommon file types (if it’s not pdf, png, jpg, csv or a file extension you are familiar with, look twice)
  • File type extension that doesn’t match the file type (for example, a document with a .pdf extension)
  • Sender details 

Conclusion

As you can see, spam emails can cause a lot of damage and you should always be careful when opening suspicious emails. 

But if you know what to look for, spam emails can be easy to spot. Taking the time to form good email security habits will protect you, your loved ones and your company from cybersecurity attacks. 

Times Magazine

AI is failing ‘Humanity’s Last Exam’. So what does that mean for machine intelligence?

How do you translate ancient Palmyrene script from a Roman tombstone? How many paired tendons ...

Does Cloud Accounting Provide Adequate Security for Australian Businesses?

Today, many Australian businesses rely on cloud accounting platforms to manage their finances. Bec...

Freak Weather Spikes ‘Allergic Disease’ and Eczema As Temperatures Dip

“Allergic disease” and eczema cases are spiking due to the current freak weather as the Bureau o...

IPECS Phone System in 2026: The Future of Smart Business Communication

By 2026, business communication is no longer just about making and receiving calls. It’s about speed...

With Nvidia’s second-best AI chips headed for China, the US shifts priorities from security to trade

This week, US President Donald Trump approved previously banned exports[1] of Nvidia’s powerful ...

Navman MiVue™ True 4K PRO Surround honest review

If you drive a car, you should have a dashcam. Need convincing? All I ask that you do is search fo...

The Times Features

What’s behind the surge in the price of gold and silver?

Gold and silver don’t usually move like meme stocks. They grind. They trend. They react to inflati...

State of Play: Nationals vs Liberals

The State of Play with the National Party and How Things Stand with the Liberal Party Australia’s...

SMEs face growing payroll challenges one year in on wage theft reforms

A year after wage theft reforms came into effect, Australian SMEs are confronting a new reality. P...

Evil Ray declares war on the sun

Australia's boldest sunscreen brand Australians love the sun. The sun doesn't love them back. Mela...

Resolutions for Renovations? What to do before renovating in 2026

Rolling into the New Year means many Aussies have fresh plans for their homes with renovat...

Designing an Eco Conscious Kitchen That Lasts

Sustainable kitchens are no longer a passing trend in Australia. They reflect a growing shift towa...

Why Sydney Entrepreneur Aleesha Naxakis is Trading the Boardroom for a Purpose-Driven Crown

Roselands local Aleesha Naxakis is on a mission to prove that life is a gift...

New Year, New Keys: 2026 Strategies for First Home Buyers

We are already over midway through January, and if 2025 was anything to go by, this year will be o...

How to get managers to say yes to flexible work arrangements, according to new research

In the modern workplace, flexible arrangements can be as important as salary[1] for some. For ma...