4 Seemingly Harmless Email Habits That Hackers Use Against You
Innocent clicks and routine habits formed over years of email use are exactly what cybercriminals count on to succeed in their attacks.
Every morning, we scan through dozens of emails, but we're unwittingly putting our security at risk. Innocent clicks and routine habits developed over years of email use are exactly what cybercriminals count on to succeed in their attacks.
4. Shortened URLs hide dangerous destinations
Shortened URLs look pretty harmless, and those little bit.ly and tinyurl.com links save space and look neater. But the problem is you can't see where they actually lead until it's too late.
Cybercriminals love URL shorteners because they effectively mask malicious websites. A 'helpful' link that claims to verify your account might redirect you to a fake login page designed to steal your credentials.
Most email clients don't preview shortened URLs, leaving you completely clueless about the destination. Even hovering over these links often shows nothing but the link shortener's domain, not the actual target website.
3. The "Unsubscribe" link may confirm you are the real target
In some spam emails, the Unsubscribe button at the bottom can often be a trap. Legitimate companies honor unsubscribe requests, but scammers use these clicks to confirm that your email address is active and being tracked. Once you click, they know they've found a real person and your address is marked as valuable.
This verification makes your email more valuable on the dark web . Verified, active addresses sell for more money to other cybercriminals, meaning more spam, phishing attempts, and potential security threats are headed your way.
2. Auto-loading images reveal more than you think
Most email apps automatically load images when you open a message. That may seem harmless, but it's not.
Senders embed tiny 1 pixel x 1 pixel email tracking pixels into those images, which report back to the sender as soon as they load. These pixels can reveal when you opened the email, the device you used, your approximate location, and even your IP address .
Marketing companies use this data to build detailed profiles of your habits. But cybercriminals exploit the same technology for darker purposes, such as identifying active targets and gathering intelligence for future attacks.
1. First, verify the document attachment
Email attachments are a popular method of distributing malware, and cybercriminals are getting better at disguising their threats. An "invoice.pdf" could actually be "invoice.pdf.exe" — a malicious executable disguised as a document. These double extensions exploit Windows' default setting to hide file extensions, making dangerous files appear harmless at first glance.
Even seemingly legitimate file types can harbor threats. Cybercriminals often use EXE and PDF files to hide viruses, turning everyday documents into Trojan horses that install malware when opened.
Don't forget to verify any attachments that look suspicious before opening them. Verify the sender through a private communication channel if possible. Additionally, you should run a virus scan to detect and avoid malicious attachments.
Discover more
Share by
Samuel DanielYou should read it
- 11 bad habits that affect health that we need to fix right away
- 13 bad habits need to be removed to work more effectively in 2019
- 7 errors to avoid when using email at work
- 9 bad habits should be removed immediately if you don't want to get in trouble
- Bad habits when using a computer should give up
- The Quiet Details That Make a Sports Betting Platform Feel Reliable
- Instructions on creating toy set images with ChatGPT AI
- How are AI agents changing the journalism industry?
- The Surprising Origins of Our Favorite English Slang Words
- Why is Last.fm still better than Spotify for finding new music?
- Can a mini computer replace a desktop computer?