Most businesses rely on spam filters to determine the legitimacy of incoming email. Yet filtering technology remains far from perfect, and a good deal of junk email still winds up in users' inboxes. This fact makes it important to be able to visually spot the differences between real email and the digital rubbish spammers generate. Being able to quickly tell the difference between real email and spam will help you save time, unclog your inbox and pay closer attention to the messages that you really want to read.
When it comes to spotting spam, here's what to look for:
Step One: Your first action when examining an email should be to check its subject line . Spammers try their best to make their emails look legitimate, yet an email's heading often betrays its true motive. Come-ons for things like herbal medicines and home-equity loans are usually quite easy to spot, since they often have hyperbolic headings like "Incredible Bargain," "Special Report," or "Limited Offer." Phishing messages can usually be identified by headings such as "Immediate Action Required" or "Verify Your Account." All of these emails can be erased with no regret.
Cryptic subject lines, such as "Frank told me to write you" or "Important business question," are more difficult to interpret and will require you to investigate the message more fully. Any messages without a heading should also be checked out more thoroughly, since it may be either spam or a genuinely important letter that was sent in haste.
Step Two: An email's "from" line can provide significant clues about a message's worthiness. You already know the names of people you regularly correspond with, so it's easy to spot messages from these individuals. On the other hand, emails with a from line that contains only a company name are almost always spam or phishing lures. To research any message's legitimacy, check out the email's return path to verify that it leads back to the person or organization that it purports to come from.
The trickiest emails to decipher are the ones sent by total strangers, who may be spammers or individuals posing a genuine business question or offer. The only method of determining the legitimacy of these messages is to investigate still further.
Step Three: The dates can sometimes provide a clue to an email's value, and take less than a second to check. If a message with a far past or future date suddenly arrives, it's more than likely from a spammer seeking attention.
Step Four: If you're still not sure about a particular message's authenticity, examine its content. If an email addresses you as a "friend," "valued customer," or "colleague," you can be sure that its sender doesn't know your name.
Poor grammar, bad spelling and awkward, non-native use of English are other signs that should arouse your attention. Also look for Web links that lead to suspicious sites (such as a message from someone supposedly at Acme Co. that contains a link leading to a non-Acme Co. site). Con artists also often use URLs that resemble the name of a well-known company but are slightly altered by adding, omitting or transposing letters.
Add-on anti-virus protection has been a fact of computer users' lives for almost as long as people can remember. But have recent changes in system software and user behavior made anti-virus software unnecessary? Let's look at the facts.