Solved

Can someone invade my computer by getting me to email them?

Posted on 2006-07-11
6
140 Views
Last Modified: 2013-12-04
Can someone gain access to data on my system, or plant something that can transmit my data to them, simply through exchange of emails?
(No attachments to open, simply inbox text).

If someone can, then what do I need to clean up the situation and prevent it from happening again?

Obviously I'm new to security and I suppose this is an easy question.

Thanks.
Biggycat
0
Comment
Question by:Biggycat
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
6 Comments
 
LVL 12

Accepted Solution

by:
gidds99 earned 38 total points
ID: 17088853
Not really, however the only possible circumstances I can think of would be where an HTML email was received and the email contained exploit code which targetted a hole in Internet Explorer (components of Internet Explorer are used to display HTML content in Outlook / Outlook Express emails).  This could only happen where the vulnrability in Internet Explorer was unpatched (or the patch had not been applied).

To secure Outlook Express (if this is what you use) here is a guide:

http://www.malwarehelp.org/securing-your-e-mail-client-outlookexpress1.html

Also ensure you apply all Microsoft Security updates (preferably by Automatic Updates) as soon as possible.

Hope this helps.
0
 
LVL 12

Expert Comment

by:gidds99
ID: 17088862
You may also reduce this risk further by using another email client such as Thunderbird or Eudora as there are less known vulnrabilities in these email clients.
0
 
LVL 14

Assisted Solution

by:ECNSSMT
ECNSSMT earned 37 total points
ID: 17090898
If you are purposefully sending email to them: No.  

If you recieved messages with attachments; and you open or unknowning execute the attachments; it can open up your system to anything from viruses to keylogging and so forth.

Emails with embedded html gifs and jpegs, at least can alert the sending spammer that your email address exists.

If you are faced with a variable that you are unsure of the potentially damaging traffic that is entering and leaving your computer; you may want to take a look at ZoneAlarm Pro; it will notify you of any ingressing or egressing traffic from your PC.  They also have an eval that you may want to take a look at.

http://www.zonelabs.com/

Regards,
0
 
LVL 12

Expert Comment

by:gidds99
ID: 17095975
>Emails with embedded html gifs and jpegs...can alert the sending spammer that your email address exists

As I mentioned above if unpatched vunlnrabilties exist they can also allow an atttacker to take over your PC.
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
In this video, viewers are given an introduction to using the Windows 10 Snipping Tool, how to quickly locate it when it's needed and also how make it always available with a single click of a mouse button, by pinning it to the Desktop Task Bar. Int…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question