Risk of email attachments

Written by nicole martinez Google
  • Share
  • Tweet
  • Share
  • Pin
  • Email
Risk of email attachments
E-mail allows us to communicate efficiently, but also can expose you to unwanted risks. (e-mail image by fotoman_65 from Fotolia.com)

Many people use e-mail to communicate on a daily basis. It has many advantages over traditional, posted mail, including speed and the ability to write to several people at once. E-mail also allows users to send files in the form of attachments. These files can include family photographs or documents for your job. E-mail attachments may harbour more vicious content.

Other People Are Reading

Identification

Your e-mail provider, such as Hotmail, Yahoo! Mail or Gmail, or the email client you use, such as Outlook or Thunderbird, should alert you when an e-mail has an attachment. Look for a paper clip symbol next to the subject or an attachment list.

Prevention

You can prevent suspicious or malicious e-mail attachments from wreaking havoc on your system by installing an antivirus program that scans your incoming e-mail. Norton, McAfee, BitDefender and Avast! are just a few of the many options for antivirus software. Browser-based e-mail providers, such as Hotmail, Yahoo Mail and Gmail, have an in-house scanner that tests attachments before you open them.

Your e-mail provider or client may have an option to allow you to read or preview the email message without opening the attachment. Most attachments need to be opened in order to damage your system.

Be especially wary when you do not recognise the sender of an e-mail. Although you might be expecting an attachment from someone you know, hackers and spam can also take over someone else's e-mail account and send you spam or other unwanted attachments. It is best to take precautions with all e-mails; not just those from unknown senders.

Be sure to always install the latest updates to your operating system.

If you do open a risky attachment, your antivirus program may block the attachment from harming your computer. However, prevention is the safest route.

Attachment Types

There are many legitimate e-mail attachments. If you recognise the sender, you may have an idea what the attachment contains.

Photo attachments may have a file type of "Jpeg," "Bmp" or "Gif," while text document may be in "Txt" or "Doc" format.

Additionally, you may recognise PowerPoint presentations as "Ppt" files and Excel spreadsheets as "Csv" files.

Other file types include "Exe," "Com" and Vbs;" these executable files run an application on your computer and are potentially dangerous.

E-mail users can archive a group of files into a folder type called "Zip." You must unzip the folder in order to access the files it contains. These files can be dangerous because you have no idea what the archive contains and your antivirus program may not be able to scan the contents.

Risks

Executable attachments can run unknown programs on your computer, destroy or corrupt data, steal and spread your personal information, decrease your computer's performance and even block antivirus or anti-malware programs from working correctly.

Attachments can include viruses that will infect your computer. Even a seemingly legitimate attachment can give you a virus. For example, SpamLaws, a security information website, describes the "ILoveYou" virus from the early 2000s as an attachment that disguised itself as an affectionate message that Internet users were likely to send to people they cared about.

Worms are a type of malicious software that use up your computer time and bandwidth, essentially clogging computers and networks.

Viruses can open your e-mail address books, extract the addresses, and automatically e-mail themselves to some or all of the addresses, according to The University of Essex website.

Reparation

If you have clicked on an e-mail attachment that released an executable file, virus or other malicious software on your computer, scan your system with antivirus software as soon as possible. When your scanner catches the virus, follow the prompts to delete or quarantine the file.

You may also want to scan your system with anti-malware software, such as Adaware or Spybot: Search and Destroy. These programs can detect malicious files that may not be viruses.

Some malicious files may require you to download special removal software. Symantec, the creator of Norton, offers removal tools for certain, especially stubborn viruses and Trojans.

If your antivirus or anti-malware program detects the malicious file but cannot remove it, try running a scan in Safe Mode. Start Safe Mode by pressing "F8" immediately after starting your computer.

Don't Miss

Filter:
  • All types
  • Articles
  • Slideshows
  • Videos
Sort:
  • Most relevant
  • Most popular
  • Most recent

No articles available

No slideshows available

No videos available

By using the eHow.co.uk site, you consent to the use of cookies. For more information, please see our Cookie policy.