Behind the term "spam" (also known as "junk mail") lies an unsolicited email sent without the recipient's consent. These emails are typically sent in bulk to a large number of recipients and relentlessly flood inboxes worldwide.
The majority of spam consists of intrusive emails (known as UBE, or "unsolicited bulk email"), such as chain letters or unsolicited commercial emails (UCE). Recipients of these emails are urged to purchase a product, hand over personal data, click on a web link, or open an attachment.
Did you know that spam currently accounts for roughly half of all emails sent worldwide?
Advertising: Some vendors of cheap watches, counterfeit medication, or illegal content use spam to promote their products. Advertising spam often contains "free" offers that actually redirect to paid subscriptions, or promises of get-rich-quick business models. These typically need to be downloaded for a fee, and the only person getting rich is the spammer.
Misinformation: Many spam emails contain information or warnings designed to sow doubt in recipients' minds. These kinds of hoaxes spread through chain emails. The content is usually fictional but creates a "snowball effect" as these chain emails are forwarded on.
Phishing: This type of spam claims to come from a specific company, often a bank. The recipient is asked to provide personal information, such as bank details and PIN codes. To achieve this, scammers create websites that look like the official bank sites. If private data is entered on these sites, it will be exploited by cybercriminals.
Malware: Malicious software, also known as malware, often reaches computers through spam. It can take the form of viruses, Trojan horses, or spyware. When programs, links, or attachments are opened, this software can infiltrate the system. Only antivirus software or other specialized tools can fight these computer infections.
A spam filter is designed to detect and block unwanted emails, also known as spam. It uses a combination of techniques to analyze the content of incoming emails and determine whether they should be classified as spam or not.
Here are some of the techniques commonly used by spam filters:
Blacklists and Whitelists: Blacklists contain email addresses or domains known to send spam. Whitelists contain email addresses or domains considered safe. Spam filters use these lists to determine whether an email should be filtered or not.
Content Filtering: Spam filters analyze the content of incoming emails to detect words or phrases commonly used in spam. They can also look for suspicious images or links.
Heuristic Analysis: Spam filters use machine learning algorithms to analyze the behavioral patterns of email senders. They can detect suspicious patterns, such as a large number of emails sent in a short period, and filter those emails accordingly.
Sender Reputation Check: Spam filters can verify the sender's reputation using public or private databases to determine whether the sender is trustworthy.
Sender Authentication: Spam filters can verify the sender's authenticity using authentication protocols such as SPF, DKIM, and DMARC to ensure the email genuinely comes from the claimed sender.
By using these techniques, spam filters can detect and block unwanted emails with high accuracy. However, it is important to note that spam filters are not infallible and may sometimes block legitimate emails by mistake.
It is therefore important to regularly check your junk mail folder to make sure important emails haven't been incorrectly blocked.
Here are the steps to enable and configure the spam filter in Outlook:
Enable the "Automatically filter junk email" option to activate the spam filter.
Enable the "Move junk email to the Junk Email folder" option to redirect unwanted emails to that folder.
Enable the "Permanently delete junk email instead of moving it to the Junk Email folder" option to automatically delete unwanted emails.
Click OK to save the changes.
The first step in detecting spam is to check the sender of the message. If you don't recognize the email address or it seems suspicious, there's a good chance it's spam. For example, an email address with numerous spelling errors or an unusual domain name should raise a red flag.
Similarly, be wary of clickbait subject lines or content that seems too good to be true. A message with a subject line like "You've won 1 million euros!" is almost certainly spam. Likewise, a message urging you to take immediate action is often illegitimate.
It's recommended to use different email addresses for your personal, professional, and marketing purposes. This helps limit the amount of spam in your main inbox and makes it easier to manage.
For example, you can use a dedicated email address for online shopping and newsletter subscriptions. That way, your professional or personal inbox won't be cluttered with promotional messages, and you'll be less exposed to spam.
The more visible your email address is on the internet, the more exposed you are to spam. Avoid publishing it on websites, forums, or social networks. If you must publish it, consider masking it in a format that isn't directly readable by email-harvesting bots.
For example, you can write "my.name [at] example.com" instead of "my.name@example.com". This way, bots won't be able to scrape your email address and you'll be less exposed to spam.
Spam emails are often riddled with spelling and grammar mistakes. If a message contains numerous errors, there's a good chance it's spam. For example, a message with glaring mistakes like "Helo, how r u doin?" should raise a red flag.
Additionally, watch for distorted logos and branding that looks similar but isn't quite right. If something seems off, don't click.
Spam often contains clickable links or images that can redirect you to malicious websites. Never click on these links, even if the message appears to come from a trusted source.
For example, a message containing a link like "Click here to log into your bank account" should raise a red flag. If in doubt, go directly to the website in question by typing its address into your browser's address bar.
Spam often uses promises of prizes, gifts, or free services to grab attention. Be aware that these promises are generally too good to be true. For example, a message promising you a free iPhone in exchange for your bank details is almost certainly spam.
Furthermore, requests for personal information (login credentials, banking information, etc.) are never made by email. No legitimate entity, whether governmental, professional, or otherwise, has the right to ask for your credit card number or personal access codes via email. Never share anything confidential in writing.
If you have any doubt about the legitimacy of a message, don't hesitate to contact the sender directly using an email address or phone number you know to be authentic. Never reply directly to the suspicious message. For example, if you receive a message from your bank that seems suspicious, contact them through their official channels.
For more information, check out these helpful resources:
Email quarantine is a particularly effective option. It helps users improve their productivity and prevents mail servers from having to process unwanted messages. An email may be quarantined because it contains malware, because its content has been identified as spam or phishing, and so on. The reasons can be numerous.
An email is quarantined so it can be sent for analysis. If it hasn't been clearly identified as unwanted, it is transferred to your "quarantine" folder, from which you can request an analysis of the sender, mark the email as junk, or release it to your main inbox.
Access the Microsoft Defender portal: Open your browser and navigate to https://security.microsoft.com. Log in if necessary.
Navigate to the quarantine section: In the portal, click on Email & collaboration, then on Review > Quarantine > Email. You can also go directly to the quarantined emails section using this link: https://security.microsoft.com/quarantine?viewid=Email.
View quarantined messages: Under the Email tab, you'll see a list of quarantined messages. You can adjust the display, sort messages, or use filters to refine your search.
Select a message to see details: Click on a message to open a flyout panel with more information about the selected message. You'll see details such as the reason for quarantine, the sender, and the recipients.
Take action on the message: Depending on your organization's policies, you'll have various options available, such as:
https://phishingquiz.withgoogle.com/
In our happy quest for a safer and cleaner inbox, here are three superheroes of the email world:
AntiSpam (SpamAssassin): Imagine a vigilant guardian at the gate of your inbox, ready to fend off unwanted spam! SpamAssassin scrutinizes every message with detective-like precision, spotting malicious spam before it can even say "junk mail" and keeping it far from your precious inbox. More peace of mind, less hassle!
AntiPhishing: Like a masked superhero, the AntiPhishing tool swoops in to protect your digital identity! It dives into the murky world of emails, foiling the sneaky plans of scammers trying to lure you with fake messages. With its anti-fraud shield, it keeps you and your precious information safe.
TLS Encryption: Imagine an invisibility cloak for your emails, making them invisible to prying eyes during their journey across the internet. TLS encryption is that magical cloak, wrapping your messages in a cocoon of security so that only you and the intended recipient can see those precious words.
This article is the 7th in a series of 11.
Membre de l'équipe Reboot à Strasbourg, Erin intervient sur les projets IT et conseil dans le Grand Est. Un profil qui préfère laisser parler ses résultats plutôt que son LinkedIn.
LinkedInGet our best articles every month.
Sensibiliser aux risques IA bancaire. Un projet pédagogique démontrant 9 vulnérabilités LLM.
ProjectLever le frein de la confidentialité pour permettre l'adoption de l'IA dans un cabinet juridique.
ArticleLe RGPD et les cookies en BtoB Voici un article qui résume mes recherches sur la conformité RGPD et les conformité politique de Cookies. Il ne rem...
ArticlePère Castor, raconte-moi N8N N8N (prononcez « n-huit-n » ou « nodemation » si vous voulez faire classe). C'est un outil qui permet de connecter vos...
ArticleL'intelligence artificielle s'est invitée dans le quotidien des marketeurs à une vitesse record. En quelques mois, des outils comme ChatGPT,...
ArticleLe risque ? Créer une \"illusion de compétence\" tout en laissant les véritables lacunes stratégiques se creuser. La solution est pourtant simple et...