Possible to Get Malware by Just Opening an Email?

  • Thread starter Thread starter kyphysics
  • Start date Start date
  • Tags Tags
    Email
Click For Summary

Discussion Overview

The discussion revolves around the potential risks of malware infection from opening emails, particularly those that appear suspicious. Participants explore the implications of clicking on links, loading images, and the general safety of email interactions. The conversation includes technical explanations and personal experiences related to email security and malware detection.

Discussion Character

  • Exploratory
  • Technical explanation
  • Debate/contested

Main Points Raised

  • One participant describes receiving suspicious emails and questions whether simply opening them poses a risk if no links are clicked or downloads made.
  • Another suggests that running malware and virus checks is advisable, even if the email was not interacted with further.
  • Some participants mention that email clients often have spam features that can help prevent future accidental openings of similar emails.
  • There is a discussion about the risks associated with embedded images in emails, with some arguing that these can trigger malware installations without user interaction.
  • One participant explains that the act of loading an image, even if it is invisible, can lead to malware infection, raising concerns about email security settings.
  • Technical details are provided regarding the structure of emails, including headers, text, HTML, and attachments, with emphasis on the potential dangers of clicking on links or downloading attachments.
  • Participants discuss the concept of "stegosploit," which involves hiding malware within images, and the implications of viewing documents without downloading them.

Areas of Agreement / Disagreement

There is no consensus on the absolute safety of opening suspicious emails. While some participants believe that merely opening an email is generally safe, others highlight the potential risks associated with embedded content and the need for caution.

Contextual Notes

Participants express uncertainty about the effectiveness of various email security settings and the implications of different types of email content. The discussion reflects a range of experiences and technical understandings regarding email safety.

Who May Find This Useful

This discussion may be useful for individuals concerned about email security, those interested in understanding malware risks, and users seeking to enhance their email safety practices.

  • #31
From an earlier paragraph in the article:
This basic technique has been developed further so that many types of elements can be used as beacons. Currently, these can include visible elements such as graphics, banners, or buttons, but also non-pictorial HTML elements such as the frame, style, script, input link, embed, object, etc., of an email or web page.
 
Computer science news on Phys.org
  • #32
That is correct for a web page, but not for an email (well it may have been about 20 years ago when HTML emails were first a thing, but certainly not 'currently').
 
  • #33
It should be mentioned that email clients are not alike. I use gmail. The privacy of gmail sucks. But gmail does an excellent job of filtering out spam and malware mails.

Only 3 or 4 times per year does a suspicious mail make it through to my inbox.
 

Similar threads

  • · Replies 67 ·
3
Replies
67
Views
8K
  • · Replies 1 ·
Replies
1
Views
1K
  • · Replies 9 ·
Replies
9
Views
2K
  • · Replies 3 ·
Replies
3
Views
2K
  • · Replies 3 ·
Replies
3
Views
2K
  • · Replies 6 ·
Replies
6
Views
2K
  • · Replies 47 ·
2
Replies
47
Views
25K
  • · Replies 3 ·
Replies
3
Views
2K
  • · Replies 4 ·
Replies
4
Views
2K
Replies
16
Views
3K