Sunday, June 7, 02:34
Home how To How to detect and handle suspicious email attachments?

How to detect and handle suspicious email attachments?

email attachments

We receive a lot every day emails. However, some of them can be dangerous. Let's go see how we can detect and handle suspicious messages e-mail attachments reaching our inbox. We must always be in stand-by and be careful especially when we are going to open an attachment.

The hackers they often use malicious attachments to target unsuspecting users. Attachments may contain Trojans, viruses etc. They are constantly finding smart ways to "Trick" security filters email and reach our inbox. If such a malicious email arrives, opening the attachment alone can lead to problems.

If you receive an email from unknown source, avoid opening the attachment. If the computer protected by the right software, reading email may not be dangerous. However, the same does not apply to email attachments. Email providers usually scan and delete dangerous attachments along with it antivirus, but some manage to pass.

Some emails they seem to come from reliable sources. But it can just be Phishing emails that represent someone we know and are intended to put on risk our cell phone or our computer.

Detection of suspicious email attachments from their expansion

The first thing we need to check is extension. The extension informs us about the file type of the attachment. For example, if the file ends up in .jpg is image. If it's .avi it's video.

An extension we should generally avoid is .exe, which performs an installation. The program installed may be malicious. While most email service providers rule this out archives, sometimes they pass. A few more extensions to avoid include: .jar, .cpl, .com, .bat, .msi, .js, .wsf and many more. If the extension looks strange, you should be suspicious.

email attachments

What if it's just an Office file? The attachment may be fine, but we need to take some precautions. May contain malicious macros. If his file Office ends with m, has macros (eg docm. pptm and .xlsm). While some secure files use macros, it's best to avoid them until you've verified that they come from a trusted source.

The basic rule is to open extensions that we trust. Image files, Office files without macros and PDF it's usually okay, provided we have updated our systems.

Is it an encrypted file?

Archive files are useful for many reasons. They allow users compress multiple files into one package, making it easier to send. However, they can also be used by hackers. If we receive email attachments with extensions, such as .7z, .rar or .zip and requires us to put a code access, may be suspicious.

Because they protect files with password; This is usually done to prevent scanning by antivirus programs. They can do it to hide a malicious software. Of course, a code can be placed because it contains sensitive information. Once again, we need to make sure that it comes from a reliable source before we open it.

Who is the sender?

Usually, we trust emails from acquaintances. The general rule is to avoid them e-mail from unknown senders. However, someone we know may have been infected and may infect us. If an acquaintance of ours sends us a strange email (with a strange attachment) we must contact him to check it.

What does it say email;

Before we open an attachment, we need to read the email. If it appears to be from a reliable source, but the content does not look like something it would send, it could be a sign that it is malicious. These emails usually have typographical, grammatical and syntactic errors.

If we receive an email from Amazon telling us to download something and then run it, it could be a sign of fraud. Most Companies they wouldn't do that.

Virus alerts

If our email belongs to a major service provider, such as Yahoo !, the gmail or Hotmail, are done scans in email attachments and warn us if they are potentially dangerous. So, such notice makes us understand that email is suspicious.

If, however, we download the attachment and the virus protection program tells us not to continue, we need to listen.

We must always be careful to stay safe!

From the above, it seems that it should we check a lot of things before we open an attachment in an email. We should always be suspicious and consider an email as potentially dangerous.

Usually, email services allow us to do that preview of email attachments without downloading, so we can take advantage of this opportunity. We look at its contents and if everything looks good, we download it. We need to be vigilant!


Please enter your comment!
Please enter your name here

Digital Fortress
Digital Fortress
Pursue Your Dreams & Live!


Lyrics from AI technology or from people: Can you tell them apart?

While a large percentage of people can recognize when they are talking on a chatbot instead of a human operator, it seems that this is not the case ...

Technology and children: When are they ready for safe use?

Today's children and teens use various messaging apps and social media to ...

Call of Duty Black Ops Cold War: The first video leaked

The first video from the gameplay of Call of Duty 2020, which is rumored to be called Black Ops Cold War, has just been revealed.

Elon Musk: "It's time to break up Amazon"

Elon Musk intensifies the fight with Jeff Bezos with a new tweet: The General Manager of Tesla Inc., Elon Musk, said ...

Attack on America's 5G towers on Saturday!

Protests over 5G connectivity are scheduled to take place over the weekend, according to NATE. According to a recommendation that was identified ...

Windows 10 Updates: You can block them with Wu10Man!

Microsoft launched the Windows 10 update in May 2020, so it will be available on your computer soon ....

ECh0raix Ransomware: New campaign targets QNAP NAS devices!

Malicious agents behind eCh0raix Ransomware have launched a new campaign targeting QNAP NAS devices. ECh0raix was observed ...

Mac: How to change the storage location of your screenshots?

When you take screenshots on your Mac device using the Shift-Command-3 shortcut to take a screenshot of the entire computer screen or Shift-Command-4 ...

Malware USBCulprit: Aims devices that are not connected to a network

Did you think that devices without any connection to a local or other network (air-gapped devices) are safe? Think again! The USBCulprit malware that ...

Free Microsoft Teams: You can finally create meetings!

Users of the free version of Microsoft Teams can now create video meetings. The change, identified by ...