What are the two best options to avoid security problems caused by attachments?

by GOsafeonline | 23 October 2012


Electronic mail or Email is one of the easiest and most convenient channels where we can transfer information and share data with others. However, it is also common to receive information or emails that contain malicious attachments or dubious messages. Some email service providers filter and mark such dubious emails with the word “SPAM” in the subject of the email, indicating to the recipient that the email is either a junk email or unsolicited email with dubious content sent to numerous recipients by the sender. Clicking on links in such spam email may direct the recipient to phishing web sites or sites that download malware to the victim’s computer.

It is not surprising that most of us have encountered numerous spam emails in our inbox and believe it or not, your behavior online contributes to the spam messages that you receive. Here are five simple ways to fight spam and to protect yourself online:

What are the two best options to avoid security problems caused by attachments?

  1. Never give out or post your email address publicly
    You should remember that everyone can easily access the Internet. That means, spammers are also lurking on the Internet and are constantly seeking available email addresses which they will send spam emails to. Posting your email address publicly allows others to send spam emails to you, or worse, hack your account if you are using a weak password.
  2. Think before you click
    There might be instances where your email service providers’ automated email filter mistakenly mark legitimate emails as spam email due to its content (e.g. the email contains a hyperlink). However, in most cases, emails marked as “SPAM” or redirected to the spam folder of your mailbox are sent by spammers. Subject of spam messages usually include offer of cheap prescription drugs, advertisements on new medicines, and status of packages from shipping companies. Make sure that you scrutinize the content of spam emails before opening any attachments (even if it looks like an innocent text or image file) or clicking on hyperlinks. Refrain from downloading contents blocked by your email service providers in such emails too.
  3. Do not reply to spam messages
    Almost all spam messages are malicious emails sent by unknown sources. These sources could be hackers who aim to hack into the computers of their victims. Never respond to spam messages because through this, the spammer will know that the email address is active and thus, it increases the chance of your email to be constantly targeted by the spammer.
  4. Download spam filtering tools and anti-virus software
    Spam filtering tools and anti-virus software can help to scan the emails that you received for malware. If the emails that you received contain malware, the malicious content would be quarantined and you would be prevented from opening it. This helps to alleviate the chance of emails containing malware from infecting your computer. As such, do select spam filtering tools and anti-virus software with such features to reduce your woes of having to decipher email contents.
  5. Avoid using your personal or business email address
    Do not use your personal or business email address when registering in any online contest or service such as applications, deal updates, etc. Many spammers watch these groups or emailing lists to harvest new email addresses.

What are the two best options to avoid security problems caused by attachments?

There are many ways to avoid being a victim of spam messages. But the most important thing is to be cautious in opening your emails. Always make sure that the emails that you open are from trusted sources and do not look dubious. If you received any of such suspicious emails, you may forward them to the Singapore Computer Incident Response Team (SingCERT) for their investigation.

Security Tip (ST04-010)

Original release date: September 10, 2009 | Last revised: November 14, 2019

While email attachments are a popular and convenient way to send documents, they are also a common source of viruses. Use caution when opening attachments, even if they appear to have been sent by someone you know.

Why can email attachments be dangerous?

Some characteristics that make email attachments convenient and popular also make them a common tool for attackers:

  • Email is easily circulated – Forwarding email is so simple that viruses can quickly infect many machines. Most viruses do not even require users to forward the email—they scan a users' mailbox for email addresses and automatically send the infected message to all of the addresses they find. Attackers take advantage of the reality that most users will automatically trust and open a message that comes from someone they know.
  • Email programs try to address all users' needs – Almost any type of file can be attached to an email message, so attackers have more freedom with the types of viruses they can send.
  • Email programs offer many "user-friendly" features – Some email programs have the option to automatically download email attachments, which immediately exposes your computer to viruses within the attachments.

What steps can you take to protect yourself and others in your address book?

  • Be wary of unsolicited attachments, even from people you know. Just because an email message looks like it came from someone you know does not mean that it did. Many viruses can "spoof" the return address, making it look like the message came from someone else. If you can, check with the person who supposedly sent the message to make sure it's legitimate before opening any attachments. This includes email messages that appear to be from your internet service provider (ISP) or software vendor and claim to include patches or antivirus software. ISPs and software vendors do not send patches or software in email.
  • Keep software up to date. Install software patches so that attackers can't take advantage of known problems or vulnerabilities . Many operating systems offer automatic updates. If this option is available, you should enable it. (see Understanding Patches and Software Updates for more information)
  • Trust your instincts. If an email or email attachment seems suspicious, don't open it, even if your antivirus software indicates that the message is clean. Attackers are constantly releasing new viruses, and the antivirus software might not have the signature. At the very least, contact the person who supposedly sent the message to make sure it's legitimate before you open the attachment. However, especially in the case of forwards, even messages sent by a legitimate sender might contain a virus. If something about the email or the attachment makes you uncomfortable, there may be a good reason. Don't let your curiosity put your computer at risk.
  • Save and scan any attachments before opening them. If you have to open an attachment before you can verify the source, take the following steps:
    1. Be sure the signatures in your antivirus software are up to date.
    2. Save the file to your computer or a disk.
    3. Manually scan the file using your antivirus software.
    4. If the file is clean and doesn't seem suspicious, go ahead and open it.
  • Turn off the option to automatically download attachments. To simplify the process of reading email, many email programs offer the feature to automatically download attachments. Check your settings to see if your software offers the option, and make sure to disable it.
  • Consider creating separate accounts on your computer. Most operating systems give you the option of creating multiple user accounts with different privileges. Consider reading your email on an account with restricted privileges. Some viruses need "administrator" privileges to infect a computer.
  • Apply additional security practices. You may be able to filter certain types of attachments through your email software (see Reducing Spam) or a firewall (see Understanding Firewalls). 

Please share your thoughts.

We recently updated our anonymous product survey; we'd welcome your feedback.

What security measures should you take when opening attachments?

Save and scan any attachments before opening them. Be sure the signatures in your antivirus software are up to date. Save the file to your computer or a disk. Manually scan the file using your antivirus software. If the file is clean and doesn't seem suspicious, go ahead and open it.

How do I protect email attachments?

Send messages & attachments confidentially.
On your computer, go to Gmail..
Click Compose..
In the bottom right of the window, click Turn on confidential mode . Tip: If you've already turned on confidential mode for an email, go to the bottom of the email, then click Edit..
Set an expiration date and passcode. ... .
Click Save..

What types of attachments can be removed most probably for security reasons?

Resolution. File attachments in email are common threat vectors for malware. Executable files are not the only file type that can include threats. For example, Microsoft Office documents (e.g. doc, docx, xlx, xlsx, ppt, pptx, etc) can contain macros or scripts that include threats.

Which of the following are best practices around email attachments?

Guidelines for Sending Email Attachment.
Consider the File Format..
Use a Link When Necessary..
Avoid Sending Large Email Attachments..
Ask First Before Sending an Attachment..
Always Address the Included Attachments..