• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » secure email » How to Protect Yourself Against Spam Emails

How to Protect Yourself Against Spam Emails

2018-08-20 by Michelle Dvorak

How to Protect Yourself Against Spam Emails

Email is one of the most popular and convenient communication channels where users can share data and transfer information with other people. It is also a convenient channel for spammers. Spam emails are a form of a cyber attack where hackers and other unscrupulous users send emails that include malicious attachments, suspicious messages, or phishing scams.

Email service providers mark suspicious emails as spam in the subject line to tip of the recipient that the email deserves a closer look before trusting the sender. This indicates to the recipient that the email is unsolicited, bulk junk email, from an untrusted email server or spam. If the receiver clicks on such a spam email, he may be directed to a phishing website or other sites that can download malware to a computer.

Why are we susceptible to malicious emails?

It is very common for most of us to encounter a barrage of such spam emails in our inboxes, but it is our online behavior that is mostly responsible for the success of spam emails.

Spammers sometimes use a cyber attack known as social engineering to phish for personal information. The goal of social engineering is to gain more information – like an password, email login, password, or bank account number – from the recipient. The spammer may pretend to be someone the user trusts or may an offer something that is too tempting to resist. Spammers do a lot of research into effective social engineering attacks and always on the lookout for easy targets.

Spammers are looking for personal information like names, school names, birthdates and the answers to other common password reset questions. After they gain the desired information, these spammers send additional emails to their targets, that include a believable, but fake story designed to lure or convince the recipient to give even more information – usually by clicking through the email to a scam website that is designed to collect data. Resetting a password is a common spam tactic.

With so much dependency on social media these days, we are much more vulnerable to such spam cyber attacks. Our social media accounts provide rich information about our events, email addresses, and activities. Spammers use this information to reach out to us. Therefore, we must think twice before sharing our personal information on a public forum.

How to Protect Yourself Against SPAM Emails

Think Before You Click!

Then think again. In most cases, the automated email filter detects a malicious email, marks it as junk, and sends it to the recipient’s spam folder. These emails usually include tempting offers, advertisements, false alerts, or information about cheap prescription drugs, how to earn more money, etc.

Be sure to scrutinize the contents of these emails before deciding on to open attachments. If something seems odd about the email, then don’t click on any links! Don’t download anything from the email including images. Mark the email as spam or junk to help your email service (like Microsoft Outlook for example) learn the spam pattern.

Occasionally look at the contents of your email spam folder to check for legitimate emails that were mistakenly marked as spam.

Verify the Sender

Email from addresses contain two names – the sending email address and the friendly name. If the sender is already in you contact list, the email may appear to be from their friendly name. For example, emails from my brother Steven, don’t show as coming from his email address, they from address just list the name Steven. However, if I look at the sending email address, I can see if it is truly his email address, which I would recognize. Those two elements must match – his friendly name and his legitimate email address.

Never Post Your Email address in Public Forums

Keep in mind that spammers surf and scrape public forums looking for easy prey. That’s you if you’re post personal information in a public forum. Hackers are always on the lookout for email addresses that are available cheaply, in this case for free, for sending even more spam emails.

Also, when participating in an online contest, deals, updates or applications – never use your business or personal email. Many spammers parse through email lists of such events to target new email addresses. It is easy to write an application that reads a website automatically and collects all the emails posted in a forum, blog, or comments section of any website. Keeping your emails on a public and unprotected forum invites others to send spam emails or even can hack your account by breaking a weak password.

Never Reply to Spam Emails

Almost all the spam emails contain malicious messages sent from suspicious sources. The rest are adverts, offers, and other money-making schemes, these may be hackers looking to intrude into your computer. Never respond to such spam emails. Replying to spam will confirm to the hacker that your email address is working. You will then be targeted for future emails. This includes trying to unsubscribe from spam – this click also (unfortunately) verifies that your email address is valid. Also, some spammers analyze log and recipient responses to their spam messages. They assess their performances. The more the recipient responds, the more future spam emails he will receive.

Use of Anti-virus Software and Spam Filtering Tools

Anti-virus software and spam filtering tools can scan every email and check for malware and phishing scams. If at all any malware is present, these tools will quarantine the spam and will prevent you from opening it. anti-virus software helps keep a computer free from malware and spam, but it is not a guarantee. Be sure your computer’s apps are kept up-to-date.

Use Multiple Email Addresses

It is imperative that you set up multiple addresses for personal, public and business correspondences. Your personal email should be shared only with a restricted set of family and friends. Also, create your personal email address in such a way that it is difficult to derive. Spammers often tend to build a list of target emails by assembling obvious words, names, and numbers. Therefore, you should resist the temptation to use parts of our name in your personal email address.

Another spam fighting idea is to keep changing your public email address. You can use these email addresses for online use where you need to register for public forums or contests.

Update Your Web Browser Regularly

In May 2017, malware WannaCry infected thousands of machines and shut down Britain’s National Health System. However, the patch had been released two months earlier by Microsoft. Update computer web browsers (like Chrome and Internet Explorer) on a regular basis to stay ahead of spammers. The updated version of the browser that is equipped with current security patches and libraries.

Beware of Fake Unsubscribe Links

Spammers also use legit looking emails containing bogus unsubscribe links. If you click on them, your chance of receiving spam emails will only increase. Therefore, it is advisable that you should never click on the ‘unsubscribe’ link in an email coming from an unsolicited sender. Always give an email a hard look to truly be sure it was sent by who is claims it was sent by.

Filed Under: secure email Tagged With: phishing, spam, tutorial

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version