Download presentation
Presentation is loading. Please wait.
Published byThomas Williams Modified over 6 years ago
1
E-mail links and attachments: Help stop malware from spreading
By Michael P. Kassner With induced malware making a resurgence, it might be a good time to review what is considered to be good practice when it comes to attachments and links.
2
and malware attachments and links are popular methods for bad guys to install malware on computers. So it’s important to understand what to do when you get an that has an attachment or link in the message body.
3
attachments attachments are files that accompany messages. Attachments can be one of two things: The actual file or document designated in the A copy of the expected attachment that has malware embedded in it
4
links links are the underlined phrases in messages that simplify going to a specified Web site. Clicking on a link can cause one of three things to happen: The link opens the correct Web page referred to in the . The link activates a malware program embedded in the message. The link is spoofed. It opens a Web page similar to the correct page, but with malware embedded in it.
5
Malware Malware is malicious software that’s designed to infiltrate or cause damage to computer systems without the user’s knowledge or permission. Viruses, worms, trojans, and spyware are all considered malware.
6
Activating malware malware requires user intervention to get started. It’s that simple. The bad guys will try any method possible to entice you to open an attachment or click on a link. One of their favorite tricks is to pretend that the is from someone you know. That way you have no reason to be suspicious.
7
Spread to other computers
Once installed, the malware will immediately try to infect other computers by sending out messages with the same infected attachment to all the addresses it found on the newly-infected computer. Those recipients will more than likely open the attachment as well, because it appears to be from someone they know. So it’s not hard to see that this process will quickly overrun every computer on the network.
8
Outside contacts This type of malware doesn’t care whether it’s sending the infected or attachment to another employee or an outside contact. I don’t think I have to mention how detrimental it would be if a client’s computer became infected after opening an attachment from you.
9
Not practical That all makes sense, but what about all the messages containing attachments and /or links that are pertinent to the business. They can’t just be deleted, so what other options are there?
10
Attachment workaround:
It’s not convenient to do, but to be safe it’s advisable to contact the party that sent the attachment and make sure they did intentionally send it to you. If that person’s computer is infected, there’s a good chance that they didn’t even realize you received an message from them.
11
Active-link workaround:
The bad guys are hoping that you will automatically click on links. Don’t oblige them; use the following steps to prevent malware from being installed on your computer: Make sure the link makes sense and isn’t misspelled. Copy and paste the link address into the Web browser instead of clicking on it. Don’t use the link and go to the Web site on your own accord (preferred method).
12
Final thoughts The best way to avoid having your computer become a victim of malware sent by is to be cautious; be alert to anything that’s out of the ordinary, and follow as many of the above suggestions as possible.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.