Cybersecurity misconception: Why you should never delete spam emails

The Boss

Cybersecurity misconception: Why you should never delete spam emails

cybersecurity, delete, emails, misconception, spam

CURRENT FRAUD ALERT

Every day, numerous spam emails land in your inbox and then in the virtual trash can. But this only leads to more unwanted messages. Here’s how to deal with it correctly.

Phishing emails are a torment in everyday life.

Phishing emails are a torment in everyday life.

Phishing emails are almost as annoying as spam calls. Every day, at least one message from cyber criminals lands in your email inbox. For many people, the most obvious step is to simply delete the unwanted email and thus put an end to the fraud attempt.

However, this is not the right approach. It will not reduce the constant flow of spam emails. However, there is an equally simple way to achieve this. All you have to do is move the fraudulent message to the folder provided for it: the spam folder.

Only if you do this can the spam filter learn to better identify phishing emails. It can then process new scams and dubious sender addresses, so that the number of phishing emails in your inbox decreases. If the fraudulent messages simply end up in the virtual trash can, the filter cannot make any progress. Phishing emails will continue to land in your field of vision and pose a potential threat to your data.

The next phishing email you receive should therefore be moved unopened to your spam folder. Depending on your email provider, this can be done either by dragging and dropping or using a corresponding button. You can be even more successful in sorting out emails by using an antivirus program.

Although the filter is constantly learning, it is not infallible. Even serious emails can end up in the spam folder. That’s why you should check it regularly. If you mark the important email as “Not Spam”, the filter learns again and knows how to classify the sender in the future.

Simple signs: How to recognize every phishing email

A first indication that you have received a phishing email: You will be asked to confirm personal data or enter it on a website. This You should not comply with this demand under any circumstancesIn addition, criminals often use the official logos of the companies they are copying in their emails, but not official sender addresses.

If the sender seems suspicious to you, you should read the email twice. This will often help you find spelling mistakes or inconsistencies in German grammar. The attackers usually don’t write their emails themselves, but instead use automatically generated messages or translate known emails using a translation program. But why all the effort?

What do criminals achieve with phishing attacks?

Phishing is used on the Internet to collect real user data. Money can be made from this when email addresses, names and other information are sold for advertising purposes or passed on in criminal forums. With the data obtained, cyber criminals can also target future phishing attacks more precisely and their attacks become more effective.

Have you received a suspicious email?

Forward it to [email protected]
or follow us on:

Phishing-Checkliste


  • Spelling mistake?

  • Sensitive data requested?

  • Official logos?

  • Unknown sender?

Attachments and links contained in malicious emails often introduce malware or viruses onto your computer. And don’t ignore suspicious emails. Forward them to the email address above and help us report future phishing attacks.

More fraud warnings on igamesnews – Stay one step ahead of cyber criminals

But phishing emails are not the only danger lurking on the Internet. In addition to attempted fraud, there are all kinds of viruses, Trojans and malware that can infect your computer. Unfortunately, data scandals are also part of everyday digital life. You can see the five most recent articles on the topic of “fraud warnings” below:

Do you want to stay informed about the latest fraud reports, subscribe to igamesnews on Twitter, Facebook and Instagram. You can also find all articles on the topic on the next page.

  • » Tipp: The best VPN providers for more security and data protection
  • » Buy a balcony power plant: Comparison of the best solar systems

Don’t miss anything with the NETWORK-Newsletter

Every Friday: The most informative and entertaining summary from the world of technology!

Leave a Comment