The Times Australia
The Times Technology News

.

4 red flags an email might be spam

  • Written by NewsServices.com

Phishing attacks are one of the most common cybersecurity threats you can encounter online. Phishing, as defined by Cisco, is “the practice of sending fraudulent communications that appear to come from a reputable source.” Because it’s normally done through email, when we think of phishing we think of spam email. 

The end goal of a spam email is to steal sensitive information (credit card, passwords) from the user or to install malicious software (malware) on the device. Malware works by damaging computers and computer systems and can leak private information, gain unauthorised access or deprive users of access (ransomware). 

There are some scary stats out there to give you a broad idea of how much harm spam emails can cause:

  • 92.4% of malware sneaks into a device through email (2018 Verizon Data Breach Investigations Report)
  • 1 in 131 emails you open on your laptop contains malware (Symantec 2018 Internet Security Threat Report)
  • Laptop owners are vulnerable to more than 4,000 ransomware attacks that occur every day (U.S. Federal Bureau of Investigation)

The top 4 red flags an email might be spam are:

1. The email address 

The first clue that an email might be spam lies in the email address itself. Hackers may compose their spam emails to appear as if they are coming from an existing contact. 

Because we’re so used to spam filters, you are more likely to open the email and not question its contents. But the way phishing works is that hackers can fake email addresses by slightly adjusting the domain name.  

Jan Chapman, Co-Founder and Managing Director of IT Security company MSP Blueshift, explains more about how this works: “A spoofed email address can for example fake an organisation’s name by one letter. For example, instead of jan@mspblueshift, a threat actor could write jan@msppblueshift. It’s a hack that it’s very easy to be overlooked, especially by an employee in an organisation. I cannot stress enough about the importance of IT security.”

2. Urgent or threatening language

Keep in mind that real emergencies don’t happen over email. 

These types of emails normally pressure the user to respond quickly. It can either be positive: “you have won a prize, claim it NOW,” or negative “we’re taking legal action against you, respond ASAP.”

Other types of urgent messages can claim to close your account, or even that your security has been compromised. Always contact your bank provider and other services to find out if the request is real. 

3. Requests for sensitive information

A phishing email appears to originate from a trusted source – more likely one that holds sensitive data or information – for example, your bank. 

The email encourages you to divulge private and sensitive information. The request could look like this:

  • * Reply to the email
  • Go to this website to complete a form
  • Update your bank details by clicking on the link 
  • Links directing you to login pages

Remember: this isn’t common banking practice, so proceed with caution. 

4. Suspicious attachments

Email attachments make even the strong curious, but you should always make sure you’re not opening or downloading attachments that contain malware. 

Look out for:

  • Attachments you didn’t ask for
  • Weird file names 
  • Uncommon file types (if it’s not pdf, png, jpg, csv or a file extension you are familiar with, look twice)
  • File type extension that doesn’t match the file type (for example, a document with a .pdf extension)
  • Sender details 

Conclusion

As you can see, spam emails can cause a lot of damage and you should always be careful when opening suspicious emails. 

But if you know what to look for, spam emails can be easy to spot. Taking the time to form good email security habits will protect you, your loved ones and your company from cybersecurity attacks. 

Times Magazine

Building an AI-First Culture in Your Company

AI isn't just something to think about anymore - it's becoming part of how we live and work, whether we like it or not. At the office, it definitely helps us move faster. But here's the thing: just using tools like ChatGPT or plugging AI into your wo...

Data Management Isn't Just About Tech—Here’s Why It’s a Human Problem Too

Photo by Kevin Kuby Manuel O. Diaz Jr.We live in a world drowning in data. Every click, swipe, medical scan, and financial transaction generates information, so much that managing it all has become one of the biggest challenges of our digital age. Bu...

Headless CMS in Digital Twins and 3D Product Experiences

Image by freepik As the metaverse becomes more advanced and accessible, it's clear that multiple sectors will use digital twins and 3D product experiences to visualize, connect, and streamline efforts better. A digital twin is a virtual replica of ...

The Decline of Hyper-Casual: How Mid-Core Mobile Games Took Over in 2025

In recent years, the mobile gaming landscape has undergone a significant transformation, with mid-core mobile games emerging as the dominant force in app stores by 2025. This shift is underpinned by changing user habits and evolving monetization tr...

Understanding ITIL 4 and PRINCE2 Project Management Synergy

Key Highlights ITIL 4 focuses on IT service management, emphasising continual improvement and value creation through modern digital transformation approaches. PRINCE2 project management supports systematic planning and execution of projects wit...

What AI Adoption Means for the Future of Workplace Risk Management

Image by freepik As industrial operations become more complex and fast-paced, the risks faced by workers and employers alike continue to grow. Traditional safety models—reliant on manual oversight, reactive investigations, and standardised checklist...

The Times Features

Is our mental health determined by where we live – or is it the other way round? New research sheds more light

Ever felt like where you live is having an impact on your mental health? Turns out, you’re not imagining things. Our new analysis[1] of eight years of data from the New Zeal...

Going Off the Beaten Path? Here's How to Power Up Without the Grid

There’s something incredibly freeing about heading off the beaten path. No traffic, no crowded campsites, no glowing screens in every direction — just you, the landscape, and the...

West HQ is bringing in a season of culinary celebration this July

Western Sydney’s leading entertainment and lifestyle precinct is bringing the fire this July and not just in the kitchen. From $29 lobster feasts and award-winning Asian banque...

What Endo Took and What It Gave Me

From pain to purpose: how one woman turned endometriosis into a movement After years of misdiagnosis, hormone chaos, and major surgery, Jo Barry was done being dismissed. What beg...

Why Parents Must Break the Silence on Money and Start Teaching Financial Skills at Home

Australia’s financial literacy rates are in decline, and our kids are paying the price. Certified Money Coach and Financial Educator Sandra McGuire, who has over 20 years’ exp...

Australia’s Grill’d Transforms Operations with Qlik

Boosting Burgers and Business Clean, connected data powers real-time insights, smarter staffing, and standout customer experiences Sydney, Australia, 14 July 2025 – Qlik®, a g...