Abstract
This article gives advice on recognising SPAM (unsolicited email) and viruses so you can delete them quickly.
Unsolicited email, commonly known as SPAM, is a
growing problem across the Internet at large. You are recommended
to delete it. If the mail looks suspicious, do
not even read it (from Outlook you can delete email using the
right button of your mouse to select the message and then selecting
delete). Viruses are often hidden inside attachments, so do not
open unexpected attachments (if you are unsure check with the
sender first). SPAM and virus emails can be disguised to trick you
into reading the email and/or performing an action. Here are
examples of some techniques to help you recognise them:
-
faked email addresses: mails can
appear to be from people you know or even from yourself. Your own
email address can appear in mails which you did not send, resulting
in non-delivery messages or unexpected replies.
-
enticing subjects: the mail subject uses
words to make you curious, believe the email is important, or
specific to you, so that you will read it.
Opening an attachment could infect your computer with a
virus.
-
asking you to forward email to people you
know: this is probably a viruses or false information - do not
forward such email.
-
join a petition or support a cause: the
petition or cause rarely exists, it is more likely that your email
address will be collected and used for further SPAM mails (as
sender or receiver). References to recent of topical events are
common techniques to make the false information look more
realistic.
-
click on a web site: if you click you could
be downloading a virus. Click "cancel" (instead of "ok") or close
unexpected dialogue boxes when using the web. This can also be a
technique to validate your email address and increase your chances
of receiving more unwanted emails.
-
money scams: one of many examples of false
information - do not believe them just delete them.
-
response to your request: the mail may
pretend that you made a request so that you will take it more
seriously.
-
remove from a list: asking you take action
to remove yourself from a list you did not join can be used to
validate your address for (ab)use in the same way as petitions and
causes.
CERN's email gateways filter more than 45,000 SPAM
emails every day, but still such email can reach you as
distinguishing SPAM from intended email is not easy. Further advice
and details of CERN's anti-SPAM techniques are at URL:
http://cern.ch/MailServices/docs/problems/spam/spam.html
CERN's computer security recommendations also
provide useful guidance:
http://cern.ch/security/recommendations