Welcome!
If you have an account, please:
Log in
Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

I want info first...

Fair enough. Click the thumbnail below:

Employees are allies, not the adversary
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

E-mail Viruses

E-mail Viruses

Viruses can destroy your files and cause all kinds of havoc. Protecting yourself involves having an Anti-Virus, but that's not always enough. Make sure you are using secure e-mail practices to help prevent viruses from infecting your computer.

Use of HTML in E-mails

It's extremely unlikely that you would be hacked just from looking at an e-mail (as long as your e-mail is only loading text and maybe some images). If you're ultra-paranoid about it or if you don't care about the pretty colors and pictures, you can eliminate the risk entirely by turning off HTML and images in your mail program.

Many online e-mail services are already blocking images and such for any e-mail that comes from untrusted senders which helps, but for all others (and if you want to just go text-only for all e-mails), the simplest way to do it is to do an online search for "Turn off html in X" where X is your e-mail program or service. You should quickly find a guide explaining how to change your settings. If not, leave a comment about the program you're using and I'll try to help.

Never Open Attachments

Knowing how hard it is to try and infect an e-mail itself, the bad guys will try to sneak one into the attachment instead. Note that some of the most famous Internet viruses spread via this method (The "Melissa" virus, the "I love you" virus, etc).

Granted I'm not serious when I say never open attachments, but be very cautious. Attachments from strangers are sure to be trouble so just ignore them. However, attachments from people you know aren't guaranteed to be safe either.

Email attachments are like an umarked package
When a virus hits someone, it can go through their address book and send itself to everyone they know (which may include you). That means that when you get the virus, it will have actually come from the computer of someone you know.

An advanced virus will either copy the contents of a previous e-mail or combine words from several to sound like a real e-mail (which will hopefully trick you into thinking your friend/family member actually sent it).

Though anti-virus programs on your computer and the ones that now automatically scan your web mail before you read it (Yahoo has McAfee scanning built in for example), the best advice for dealing with suspicious attachments is to always call or contact the sender to verify its authenticity before you open it.

Never carelessly follow links

(Particularly for the shortened links on social networking sites)

Now that attachments aren't working as well, the best way for the bad guys to get you is to lure you away from the safety of your inbox out into a more dangerous area online (the "dark side" of the web).

Because new exploits and tricks are coming out on a nearly daily basis for web browsers, you can get hacked just by visiting the wrong website. Therefore, the best defense is to never visit some parts of the web which also means you can't fall for lures.

Any e-mail from a bank or other service you use on a regular basis should be treated as suspect. It might say someone has "friended" you or that your bank account has been drained, but no matter what, never click any of the links. Instead, go to the service or website directly and check there to see if the alert was real or not.

If someone sends you a link (especially if they just send the link without bothering to write anything else making it easier to tell it was really them), trust your instincts (unless you have bad instincts in which case you shouldn't). Whenever you're not sure of a link or information in an e-mail, remember that people's accounts can be hacked and that it might not be real. Call them to verify it before doing anything.

email Tutorial
prev: Preventing Spam|INDEX|next: Phishing

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

Share This

Have a Comment or Question?

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

computer security Tutorial
|INDEX|next: Spyware Scanners

Security Software

Make sure you have a up-to-date Anti-Virus Program to protect you against bad websites or files.
Sometimes spyware gets in your computer and the anti-virus won't stop it. Use a spyware scanner to find and remove spyware and adware.
Use a software firewall to detect bad code on your computer when it tries to connect to the Internet.
Always keep your system up to date with security patches or none of the rest of your security software will matter.
Use an encryption tool to protect your important data when storing or transmitting it.
Switch to Firefox for your web browsing and you'll be better protected from Internet threats.

Safe Computing Practices

Don't get tricked by fake alerts or clever webpages into downloading viruses or spyware!

... or check out any of my other guides and tutorials by clicking here!

Anti-Virus

A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.

[Click for full description]

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]

Anti-Virus

A virus can come from files, e-mails, web pages, or even devices you plug in (like thumbdrives or printers) and destroy your files or your computer once they get in. An anti-virus is software designed to detect and prevent that from happening.

[Click for full description]

Spyware Scanners

Learn how to detect and remove spyware and adware using a free scanning tool.

[Click for full description]

Software Firewall

Learn what a firewall is and why you want one on your computer.

[Click for full description]

Operating System Updates

Make sure to keep your operating system up-to-date with security patches or else none of the rest of your security software will be able to protect you.

[Click for full description]

File Encryption

Learn how to protect your important files on your computer or when transmitting them with free tools for file encryption.

[Click for full description]

Mozilla Firefox - Internet Browser

There are many browser choices out there. Read why I think Firefox is one of the best.

[Click for full description]

Fake Alerts

Maybe you've done everything right and you're computer is sufficiently fortress-like, but then you or someone in your family falls for a simple scam that tricks them into directly installing the bad guy's virus! Learn how to spot and ignore fakes!

[Click for full description]