Blog Layout

7 ways to stop spam email from clogging your inbox

Aug 30, 2022
  • Trying to stop all spam email is tough, but there are ways for you to thwart the majority of it from reaching your inbox. 
  • Spam email is unwanted and often unsolicited, clogging your inbox with information from companies, services, or people you don’t know or aren’t interested in. 
  • Unsubscribing from mailing lists and setting up email filters are just two options that may help reduce spam email. 

If you have an email account, chances are you’ve received plenty of spam. Whether this consists of bulk messages from companies, mailing lists you’ve never signed up for, or straight-up nonsense from a strange address whose origin you can’t trace, spam email is annoying at best and potentially dangerous at worst, especially since scammers use spam to exploit more vulnerable users. 

Thankfully, there are a few things you can do to stop spam email from reaching your inbox. 

How to stop spam email 

While you may not be able to stop these unwanted messages entirely, putting a few measures in place will reduce the amount of spam you receive and clean up your inbox so messages you want to read are prioritized. 

1. Be careful about revealing your email address 

Think of your email address as a valuable piece of personal information. You don’t want just anyone getting a hold of it, so try to keep it private and avoid posting it in public forums such as message boards or revealing it on websites that have questionable legitimacy.

2. Use a throwaway email account

If you have to provide an email address to use a site but don’t want it to have your actual email address, use a throwaway account from a site like  TempMail  to keep your real account safe. The Chrome and Firefox plugin  Blur  is also a good, free alternative that will keep your real address private. 

how_to_stop_spam_email_2
Sites like TempMail can generate a temporary email address for you to use. 
Jennifer Still/Business Insider

3. Set up email filters to detect spam as it comes in 

Depending on what email client you use, there is generally the option to create email filters that automatically send messages with a particular subject line or from a particular sender directly to a junk folder or even to your trash folder. Check your client’s user guide to determine how to smartly train its filters to detect and remove spam. Likewise, you should correct your client if it happens to mark a certain message as spam erroneously.

4. Block the senders of the spam emails you receive

This step can be implemented with varying levels of success. Given that spammers often use fake email addresses that differ with every mailing, you may find that spam emails continue even after blocking the sender. However, if you notice that you’re receiving messages from the same address over and over, you can block it within your email client, which should stop it from hitting your inbox. 

how to stop spam email 3
You can block emails from specific senders within your email client. 
Jennifer Still/Business Insider

5. Whatever you do, never respond to a spam email

While it might be tempting to reply to a spam email with an angry tirade or even a request to permanently remove you from their contacts, this never works out. In fact, it could even lead to your account receiving even more spam as the sender will then know that your account is active. 

6. Don’t click on any links or buy anything from spam emails

It may seem obvious, but if a message seems like spam, it likely is. Don’t be tempted to purchase anything from one or click on any links contained within the message, even if it seems to offer a way to unsubscribe to the mailing list. Doing so could lead spammers to gain access to your private information and/or share your address with other companies that could lead to more spam. 

7. If all else fails, consider signing up for a new email address 

If you find that the number of spam mail messages is getting out of control and following the above steps hasn’t helped, it may be time to consider getting a new email address.

 

TechSavvi offers advanced cybersecurity services to protect your business from these type of attacks.

26 Apr, 2024
In continuation of Microsoft’s series of data security incidents, employees accidentally exposed internal data to the public. The leak exposed an unprotected Azure storage server containing code, scripts, and configuration files. Microsoft has announced that it has fixed a security breach that exposed internal company credentials and files to the open internet. The breach was first discovered by security researchers from cybersecurity firm SOC Radar. According to their report, an internal error resulted in an Azure storage server without password protection being given public access. The exposed data was primarily related to Microsoft’s Bing search engine, including configuration files, code, and scripts that employees used to access a range of internal systems and databases. Consequently, bad actors could identify and access locations for Microsoft's internal data. So far, it has not been made clear how long the data has been exposed. Anuj Mudaliar Assistant Editor - Tech, SWZD opens a new window opens a new window Anuj Mudaliar is a content development professional with a keen interest in emerging technologies, particularly advances in AI. As a tech editor for Spiceworks, Anuj covers many topics, including cloud, cybersecurity, emerging tech innovation, AI, and hardware. When not at work, he spends his time outdoors - trekking, camping, and stargazing. He is also interested in cooking and experiencing cuisine from around the world.
26 Apr, 2024
AT&T is notifying 51 million former and current customers, warning them of a data breach that exposed their personal information on a hacking forum. However, the company has still not disclosed how the data was obtained. These notifications are related to the recent leak of a massive amount of AT&T customer data on the Breach hacking forums that was offered for sale for $1 million in 2021. When threat actor ShinyHunters first listed the AT&T data for sale in 2021, the company told BleepingComputer that the collection did not belong to them and that their systems had not been breached. Last month, when another threat actor known as 'MajorNelson' leaked the entire dataset on the hacking forum, AT&T once again told BleepingComputer that the data did not originate from them and their systems were not breached. After BleepingComputer confirmed that the data belonged to AT&T and DirectTV accounts, and TechCrunch reported AT&T passcodes were in the data dump, AT&T finally confirmed that the data belonged to them. While the leak contained information for more than 70 million people, AT&T is now saying that it impacted a total of 51,226,382 customers. "The [exposed] information varied by individual and account, but may have included full name, email address, mailing address, phone number, social security number, date of birth, AT&T account number and AT&T passcode," reads the notification. "To the best of our knowledge, personal financial information and call history were not included. Based on our investigation to date, the data appears to be from June 2019 or earlier." BleepingComputer contacted AT&T as to why there is such a large difference in impacted customers and was told that some of the people had multiple accounts in the dataset. "We are sending a communication to each person whose sensitive personal information was included. Some people had more than one account in the dataset, and others did not have sensitive personal information," AT&T told BleepingComputer. The company has still not disclosed how the data was stolen and why it took them almost five years to confirm that it belonged to them and to alert customers. Furthermore, the company told the Maine Attorney General's Office that they first learned of the breach on March 26, 2024, yet BleepingComputer first contacted AT&T about it on March 17th and the information was for sale first in 2021. While it is likely too late, as the data has been privately circulating for years, AT&T is offering one year of identity theft protection and credit monitoring services through Experian, with instructions enclosed in the notices. The enrollment deadline was set to August 30, 2024, but exposed people should move much faster to protect themselves. Recipients are urged to stay vigilant, monitor their accounts and credit reports for suspicious activity, and treat unsolicited communications with elevated caution. For the admitted security lapse and the massive delay in verifying the data breach claims and informing affected customers accordingly, AT&T is facing multiple class-action lawsuits in the U.S. Considering that the data was stolen in 2021, cybercriminals have had ample opportunity to exploit the dataset and launch targeted attacks against exposed AT&T customers. However, the dataset has now been leaked to the broader cybercrime community, exponentially increasing the risk for former and current AT&T customers. Update 4/10/24: Added statement from AT&T about discrepancy in numbers. BILL TOULAS Bill Toulas is a tech writer and infosec news reporter with over a decade of experience working on various online publications, covering open-source, Linux, malware, data breach incidents, and hacks.
26 Apr, 2024
Home improvement retailer Home Depot confirmed with multiple publishers that it suffered a data break due to a third-party SaaS vendor inadvertently exposing a subset of employee data. IntelBroker, the threat actor behind the attack claims it has the information of 10,000 Home Depot employees. A Home Depot software vendor suffered a data breach leading to the compromise of an undisclosed number of employees. IntelBroker, the threat actor behind the attack claims it has the information of 10,000 Home Depot employees. Home improvement retailer Home Depot confirmed with multiple publishers that it suffered a data break due to a third-party software vendor inadvertently exposing a subset of employee data. Reportedly, the breach was caused by a misconfigured software-as-a-service (SaaS) application.
More Posts
Share by: