Email is a staple of our lives yet at times it threats the security of our devices. Using caution when opening email is important to protect devices from unwanted malware, spyware, and viruses. Unfortunately email can be malicious even when we know the sender if their email account has been compromised.
Examples of how emails provide threats to the security of devices are:
- Using images infested with malware or spyware - adding images to emails is helpful for many reasons but can also be used for harmful reasons. Since people learn differently adding images to present a statistic rather than just sentences is a better way to cater to any audience. In some cases images tell a story in a way words never could. Unfortunately, images can also carry malware or spyware or simply link to malicious sites.
- Through attached files infested with malware or spyware - file extensions of attached files are often masked to appear to be documents when they are really executable files. If opened or clicked, these files can cause real damage.
- By misrepresented links - these are links that appear to go to a specific website but actually go somewhere else. Due to the way hyperlinks are created, the name of the link can be set to anything while the code behind the link may be pointed to somewhere completely different. A hyperlink is coded like this:
- <a href="http://www.eyonic.com/about/renewable-energy">Apple</a>
- In an email or on a website the user would see the word "Apple" for the hyperlink, but in this example, the link is set to go to our website.
- From misrepresented senders - emails from known individuals seem safe but at times the sender name set up has nothing to do with the actual email account. Spoofing email accounts increases the likelihood people will open infected emails.
- From hacked email accounts - getting an email from friends or coworkers seems and usually is safe to open. However, if their email account was compromised, emails from them are likely full of malware, spyware or virus. When this happens, the program usually propagates by sending out to everyone in your address book, then everyone from those people's address books and continues on.
Ways to Protect the Security of your Devices