Email Spam and Attachments
- Future Students
- Current Students
- Research and Teaching
- Partners and Community
- About JCU
- Celebrating 50 Years
- Anton Breinl Research Centre
- Agriculture Technology and Adoption Centre
- Living on Campus
- Advanced Prawn Breeding Research Hub
- Advanced Analytical Centre
- Applying to JCU
- Australian/NZ Students
- Australian Lions Stinger Research
- Boating and Diving
- Australian Tropical Herbarium
- Careers at JCU
- Association of Australian University Secretaries
- Careers and Employability
- Australian Quantum & Classical Transport Physics Group
- Centre for Tropical Bioinformatics and Molecular Biology
- College of Business, Law and Governance
- College of Healthcare Sciences
- College of Medicine and Dentistry
- College of Science and Engineering
- COVID-19 Advice
- Cyclone Testing Station
- Daintree Rainforest Observatory
- Diploma of Higher Education
- Discover Nature at JCU
- Division of Research and Innovation
- Division of Tropical Environments and Societies
- Division of Tropical Health and Medicine
- Staff Intranet
- Economic Geology Research Centre
- Elite Athletes
- Foundation for Australian Literary Studies
- Gender Equity Action and Research
- Give to JCU
- Information for JCU Cairns Graduates
- Graduate Research School
- JCU Ideas Lab
- Indigenous Education and Research Centre
- Indigenous Legal Needs Project
- Student IT Essentials
- Staff IT Essentials
- Help and Support
- Stay Informed
- Choosing a strong Password
- Data Protection
- Device Security
- Email Safety
- Online Security at Home
- Web Safety
- Malware and Virus Protection
- Keep a clean device
- Protect myself from phishing
- Recover a hacked or compromised account
- Protect your digital reputation
- Report a cybersecurity incident
- Password Manager
- Student Systems
- IT Service Catalog
- Information for Agents
- International Students
- JCU College
- JCU Connect
- JCU Contact Information
- JCU Eduquarium
- JCU Global Experience
- JCU Motorsports
- JCU Prizes
- JCU Sport
- Language and Culture Research Centre
- Marine Geophysics Laboratory
- New Students
- Off-Campus Students
- Office of the Provost
- Office of the Vice Chancellor and President
- Open Day
- Outstanding Alumni Awards
- Parents and Partners
- Pathways to University
- Planning and Performance
- Planning for your future
- Professional Experience Placement
- Queensland Research Centre for Peripheral Vascular Disease
- Rapid Assessment Unit
- Researcher Development Portal
- Safety and Wellbeing
- Scholarships @ JCU
- Strategic Procure to Pay
- Student Equity and Wellbeing
- TQ Maths Hub
- Unicare Centre and Unicampus Kids
- VAVS Home
- Work Health and Safety
- WHOCC for Vector-borne & NTDs
- Australian Institute of Tropical Health & Medicine
What is Spam?
Spam is unsolicited email. From the sender's point-of-view, it's a form of bulk mail, often to a list culled from subscribers to a discussion group or obtained by companies that specialize in creating email distribution lists. To the receiver, it usually seems like junk email. In general, it's not considered good etiquette to send spam. It's generally equivalent to unsolicited phone marketing calls except that the user pays for part of the message since everyone shares the cost of maintaining the Internet.
JCU email aliases are provided to ease dissemination of information to all students and staff but their use should fall within acceptable use policy.
Spam is a significant problem for many internet users but there are a number of ways by which spam can be minimised or eliminated.
Dealing with Spam
DO NOT reply or forward Spam Emails.
Office 365 accounts
Messages sent to a JCU email address will be scanned and filtered automatically by Microsoft’s servers. Detected viruses will be deleted, and suspected spam will be placed in your Junk folder for you to review. It is important to periodically check your Junk folder to avoid missing a real message mistakenly marked as spam.
Microsoft’s Exchange Online Protection (EOP) service analyses email for spam, viruses and other Malware before delivering the filtered email to your mailbox. Any email that is suspected of being SPAM mail is quarantined and you will receive an email from Microsoft every day listing the emails that were addressed to you but quarantined. You have the choice of retaining the “Junk Mail” classification or changing the status if the email is in fact legitimate from within this email message. Instructions are included in the email describing the possible actions that you can take.
To report spam that is originating from within JCU, send all relevant details (including full message headers) to firstname.lastname@example.org, along with a short explanation, and your report will be investigated.
Spam that appears to be originating from a non-JCU email address should be reported to that addresses service provider. All email providers are required to have an address for reporting abuse of their systems, for example email@example.com. Or, you can report the spam to Microsoft. This is acted on by Microsoft and will assist them to tailoring their automatic spam filtering rules for JCU users.
Not only does Microsoft EOP scan for known viruses, it also protects against possible unknown viruses or threatening files hidden inside email attachments whose filenames match any given pattern. This can include generic patterns that trap filenames attempting to hide the true filename extension (eg. "txb.vbs").
The reason is that this is standard hacking practice and is a possible attempt to embed potentially threatening files eg. vbs scripts under the guise of documents eg. .vbs.doc or .doc.vbs
To pass through filenames must consist of three components <name>.<extension> <version> and extensions have defined types:
.doc Word document
.rtf Rich Text Format
.xls Excel spreadsheet
This is a defacto industry standard.
Certain attachment types are highly susceptible to containing viruses or malicious code. Best practice dictates that these are NOT delivered (this includes both incoming and outgoing mail). NO notification is provided to the sender or recipient given the sheer volume of these sent by hackers, trojans and MalWare.
The file types affected are as follows:
Guidelines for Naming Attachments
Follow these guidelines to reduce the number of emails rejected by EOP Quarantine:
Use short filenames
Use all small letters in filename
Do not use spaces in a filename
Do not use special characters (?, *, @, #, $, %, etc.)
Use hyphens or underscores
Do not use double or multiple file extensions (eg. filename.vbs.doc)
The maximum size for an entire email at JCU is 30Mb; this includes the message body as well as any attachments.
Opening Attachments Safely
Regard anything that meets the following criteria with particular suspicion:
Always be careful of email that has been identified as Spam by Microsoft EOP or your email client filters. While automated Spam identification is not perfect and cannot be relied on to automatically Trash, it currently provides a fairly high hit rate for identification of unsolicited email.
If they come from someone you don't know, who has no legitimate reason to send them to you.
If an attachment arrives with an empty message.
If there is some text in the message, but it doesn't mention the attachment.
If there is a message, but it doesn't seem to make sense.
If there is a message, but it seems uncharacteristic of the sender (either in its content or in the way it's expressed).
If it concerns unusual material like pornographic websites, erotic pictures and so on.
If the message doesn't include any personal references at all, (for instance a short message that just says something like "You must take a look at this", or "I'm sending you this because I need your advice").
If the attachment has a filename extension that indicates a program file.
If it has a filename with a double extension, like FILENAME.JPG.vbs or FILENAME.TXT.scr, that may be extremely suspicious. As far as Windows is concerned, it's the last part of the name that counts, so check that to find out whether it's a program masquerading as a data file, such as a text file or jpeg (graphics) file.
In all the above instances, it is recommended that you check with the sender that they knowingly sent the mail/attachment in question.