Another day, another inbox full of unsolicited emails. Who is sending these messages, and why? Spam and phishing emails are similar in that both clog up your inbox with unwanted messages, but they have different agendas and pose dramatically different
risks to you and your security. Here is everything you need to know about the differences between them and what you need to do to protect yourself.
Spam is probably the more common type of unwanted email you'll find in your inbox. It's the electronic equivalent of getting ads, postcards, and other bulk mailers in your mailbox for businesses or services that you may have no interest in. If you've been unlucky enough to find your way onto a list somewhere, you may even get a dozen (or more!) a day, but as newer lists are distributed they should taper off.
Genuine spam is annoying but relatively low risk, especially if you know enough to delete the emails without clicking on anything. The real danger is spam's close cousin, the phishing email.
Spam may be low risk, but it is annoying. Here are a few ways to keep it to a minimum.
A phishing attempt is intended to look convincing enough to get you to click on a link. You'll be taken to a page that looks like a site you trust, but is actually controlled by the scammer. The page may prompt you to enter sensitive information, such as login information, and/or download malware or viruses onto your computer.
Related post: 5 most common types of ransomware
Phishing can represent a serious security risk. Submitting sensitive information such as login credentials can result in anything from account takeover to identity theft. Likewise, malware can gain control of your computer and allow access to anything you have stored on it, from passwords to financial documents.
The best way to protect yourself is by never clicking unless you're sure. If it's an email purportedly concerning an account you have, go directly to the website and search for information there. Even social media links should be treated with caution. Hover your mouse over the link to see where it goes, and avoid links to unfamiliar websites. When in doubt, check Google!
Technology improves constantly, but as it does, so do efforts to exploit it.