The Times Australia

The Times Technology News
The Times

4 red flags an email might be spam

  • Written by NewsServices.com

Phishing attacks are one of the most common cybersecurity threats you can encounter online. Phishing, as defined by Cisco, is “the practice of sending fraudulent communications that appear to come from a reputable source.” Because it’s normally done through email, when we think of phishing we think of spam email. 

The end goal of a spam email is to steal sensitive information (credit card, passwords) from the user or to install malicious software (malware) on the device. Malware works by damaging computers and computer systems and can leak private information, gain unauthorised access or deprive users of access (ransomware). 

There are some scary stats out there to give you a broad idea of how much harm spam emails can cause:

  • 92.4% of malware sneaks into a device through email (2018 Verizon Data Breach Investigations Report)
  • 1 in 131 emails you open on your laptop contains malware (Symantec 2018 Internet Security Threat Report)
  • Laptop owners are vulnerable to more than 4,000 ransomware attacks that occur every day (U.S. Federal Bureau of Investigation)

The top 4 red flags an email might be spam are:

1. The email address 

The first clue that an email might be spam lies in the email address itself. Hackers may compose their spam emails to appear as if they are coming from an existing contact. 

Because we’re so used to spam filters, you are more likely to open the email and not question its contents. But the way phishing works is that hackers can fake email addresses by slightly adjusting the domain name.  

Jan Chapman, Co-Founder and Managing Director of IT Security company MSP Blueshift, explains more about how this works: “A spoofed email address can for example fake an organisation’s name by one letter. For example, instead of jan@mspblueshift, a threat actor could write jan@msppblueshift. It’s a hack that it’s very easy to be overlooked, especially by an employee in an organisation. I cannot stress enough about the importance of IT security.”

2. Urgent or threatening language

Keep in mind that real emergencies don’t happen over email. 

These types of emails normally pressure the user to respond quickly. It can either be positive: “you have won a prize, claim it NOW,” or negative “we’re taking legal action against you, respond ASAP.”

Other types of urgent messages can claim to close your account, or even that your security has been compromised. Always contact your bank provider and other services to find out if the request is real. 

3. Requests for sensitive information

A phishing email appears to originate from a trusted source – more likely one that holds sensitive data or information – for example, your bank. 

The email encourages you to divulge private and sensitive information. The request could look like this:

  • * Reply to the email
  • Go to this website to complete a form
  • Update your bank details by clicking on the link 
  • Links directing you to login pages

Remember: this isn’t common banking practice, so proceed with caution. 

4. Suspicious attachments

Email attachments make even the strong curious, but you should always make sure you’re not opening or downloading attachments that contain malware. 

Look out for:

  • Attachments you didn’t ask for
  • Weird file names 
  • Uncommon file types (if it’s not pdf, png, jpg, csv or a file extension you are familiar with, look twice)
  • File type extension that doesn’t match the file type (for example, a document with a .pdf extension)
  • Sender details 

Conclusion

As you can see, spam emails can cause a lot of damage and you should always be careful when opening suspicious emails. 

But if you know what to look for, spam emails can be easy to spot. Taking the time to form good email security habits will protect you, your loved ones and your company from cybersecurity attacks. 

Times Lifestyle

The Growing Trend of Gourmet Cake Delivery Services in Australia

Convenience has become a defining factor in the lives of Australians, particularly when it comes to food delivery. Whether ...

Research from Kellanova reveals almost half of Australians are up…

Kellogg’s® raises a bowl to 100 years of good mornings in Australia and a century of helping Aussies start their days right...

GetSashimi Sydney’s first sashimi bar

Get ready, Coogee, because your seafood dreams are about to come true! From the founders of Sydney’s first exclusive Sydn...

Times Magazine

How Long Do Refurbished iPhones Last?

When considering a refurbished iPhone, one common question arises: How long will it last? Refurbished phones offer a cost-effective way to own high-quality technology, but their longevity is a crucial factor in the decision-making process. Let’s ex...

Innovative Ways in Which Digital Marketing Can Be Used To Boost Engagement and Profits

The global business environment is subjected to a number of external factors which can have an impact on whether it is experiencing a period of growth or recession. Indeed, the global business environment has changed dramatically during the last fe...

A Guide to Switchboard Selection and Maintenance

Switchboards are essential components in any electrical distribution system, serving as the central hub that manages and distributes electricity throughout a building or facility. The proper selection and maintenance of switchboards are crucial for...