{"id":5741,"date":"2021-09-01T00:41:37","date_gmt":"2021-09-01T07:41:37","guid":{"rendered":"http:\/\/blog.hellotech.com\/?p=5741"},"modified":"2023-01-18T19:53:09","modified_gmt":"2023-01-19T03:53:09","slug":"which-email-attachments-are-generally-safe-to-open","status":"publish","type":"post","link":"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open","title":{"rendered":"Which Email Attachments Are Generally Safe to Open?"},"content":{"rendered":"\n<p><a href=\"https:\/\/us-cert.cisa.gov\/publications\/virus-basics\">According<\/a> to the US Cybersecurity and Infrastructure Security Agency (CISA), \u201cmost users get viruses from opening and running unknown email attachments.\u201d The agency goes on to <a href=\"https:\/\/www.cisa.gov\/tips\/st04-001\">say<\/a> that opening a malicious email attachment allows hackers to alter your files, steal your credit card information, or worse. Here\u2019s everything you need to know about which email attachments are safe to open and how to scan an attachment on a Windows 10 computer.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-never-open-email-attachments-marked-as-spam\">Never Open Email Attachments Marked as Spam<\/h2>\n\n\n\n<p>By default, most email clients (like Gmail, Outlook, and Yahoo Mail) scan your email attachments for viruses. Most suspicious emails are either automatically deleted or filtered out from your inbox into a folder marked \u201cSpam.\u201d<\/p>\n\n\n\n<p>While it is safe to open any emails, you shouldn\u2019t click any links or open any attachments in emails marked as spam.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><span data-src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/email-attachment.jpg\" rel=\"lightbox\" data-fancybox><img decoding=\"async\" width=\"598\" height=\"168\" src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/email-attachment.jpg\" alt=\"email attachment\" class=\"wp-image-24779\" srcset=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/email-attachment.jpg 598w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/email-attachment-300x84.jpg 300w\" sizes=\"(max-width: 598px) 100vw, 598px\" \/><\/span><\/figure>\n<\/div>\n\n\n<p>Unless you are using very old software, you won\u2019t get a virus just by opening an email anymore. This is because most viruses require you to take some sort of action (like opening an attachment or clicking on a link) in order to infect your computer these days.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Only Open Email Attachments from Trusted Sources<\/h2>\n\n\n\n<p>To protect yourself from malicious email attachments, the Federal Bureau of Investigation (FBI) <a href=\"https:\/\/www.fbi.gov\/scams-and-safety\/common-scams-and-crimes\/spoofing-and-phishing\">warns<\/a> you to \u201cnever open an email attachment from someone you don\u2019t know.\u201d The agency also advises you to \u201ccarefully examine the email address\u201d before opening an attachment.<\/p>\n\n\n\n<p>Hackers have the ability to \u201cspoof\u201d (or fake) an email address to make it look like it\u2019s from your boss, a family member, or even a major company like Apple or Microsoft. So, before you open an email attachment, you should always check the sender\u2019s full email address before opening an attachment.<\/p>\n\n\n\n<p>For example, if you get an email from Amazon, the returns email address should end with <a href=\"mailto:XXX@Apple.com\">@amazon.com<\/a>. If the email address doesn\u2019t match the sender\u2019s name, or it looks suspicious at all, you should not open the attachment.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><span data-src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/amazon-spoof_3-1024x400.jpg\" rel=\"lightbox\" data-fancybox><img decoding=\"async\" src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/amazon-spoof_3-1024x400.jpg\" alt=\"amazon spoof 3\" class=\"wp-image-24776\" width=\"777\" height=\"0\" srcset=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/amazon-spoof_3-1024x400.jpg 1024w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/amazon-spoof_3-300x117.jpg 300w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/amazon-spoof_3-770x301.jpg 770w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/amazon-spoof_3.jpg 1035w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/span><\/figure>\n<\/div>\n\n\n<p>The Department of Homeland Security (DHS) says you can also identify malicious emails by looking for spelling and grammar mistakes, as well as messages that address you by the wrong name or emails that don\u2019t contain any content other than an attachment.&nbsp;<\/p>\n\n\n\n<p>Hackers even have the ability to take over an email account and send malicious attachments with their email address. So, the FBI <a href=\"https:\/\/www.fbi.gov\/video-repository\/phoenix-tech-june2021.mp4\/view\">recommends<\/a> you contact the sender to confirm they sent you an attachment before you click on it. If the email is from your bank or credit card company, you should go to their official website and find a way to contact them from there.<\/p>\n\n\n<div style=\"margin-left: auto; margin-right: auto; text-align: center; \" id=\"hello-338730271\"><a data-no-instant=\"1\" href=\"https:\/\/www.hellotech.com\/tech-support\/virus-removal?utm_campaign=Blog-BannerAd_Computer_Computer-virus&#038;utm_content=Computer-virus-SQUARE\" rel=\"noopener\" class=\"adv-link\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2023\/02\/Computer-Computer-Virus-Computer-Virus-SQUARE.png\" alt=\"Computer Computer Virus Computer Virus SQUARE\"  srcset=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2023\/02\/Computer-Computer-Virus-Computer-Virus-SQUARE.png 555w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2023\/02\/Computer-Computer-Virus-Computer-Virus-SQUARE-300x285.png 300w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2023\/02\/Computer-Computer-Virus-Computer-Virus-SQUARE-210x200.png 210w\" sizes=\"(max-width: 555px) 100vw, 555px\" class=\"advanced-ads-image-detect\" width=\"555\" height=\"528\"  style=\"display: inline-block;\" \/><\/a><\/div>\n\n\n<h2 class=\"wp-block-heading\">Only Open Email Attachments with Safe File Extensions<\/h2>\n\n\n\n<p>Once you know an email is from a trusted sender, hover your mouse over the attachment to see the file extension. This is the last three or four letters that appear after the period in a file name that lets your computer know which application can open the file.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><span data-src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/unnasdadamed.jpg\" rel=\"lightbox\" data-fancybox><img decoding=\"async\" width=\"595\" height=\"215\" src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/unnasdadamed.jpg\" alt=\"unnasdadamed\" class=\"wp-image-24775\" srcset=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/unnasdadamed.jpg 595w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/unnasdadamed-300x108.jpg 300w\" sizes=\"(max-width: 595px) 100vw, 595px\" \/><\/span><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\">Images, Video, and Audio Files:<\/h3>\n\n\n\n<p>Email attachments that contain images, videos, and audio files are generally considered to be the safest to open. These include files with common extensions such as JPG, PNG, GIF, MOV, MP4, MPEG, MP3, and WAV.<\/p>\n\n\n\n<p>However, it is important to note that, even if an image looks safe, it could be another type of file in disguise. So, you should only open an attachment if you know who it is from, and you were already expecting the attachment.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Office Documents:<\/h3>\n\n\n\n<p>Microsoft Office documents can contain \u201cmacro\u201d viruses, which are hard to detect because they are written in the same language as programs like Word, Excel, and PowerPoint. These include files with extensions like DOC, DOCX, XLS, and PPT.<\/p>\n\n\n\n<p>The macro will not be activated automatically unless it is from a <a href=\"https:\/\/support.microsoft.com\/en-us\/office\/add-remove-or-change-a-trusted-location-7ee1cdc2-483e-4cbb-bcb3-4e7c67147fb4\">trusted location<\/a>. So, in order to be able to edit the document, you will have to activate the macro manually by clicking the Enable Content button at the top of your screen. However, Microsoft warns you not to do so \u201cunless you&#8217;re certain that you know exactly what that active content does.\u201d<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><span data-src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/c1540e12-a0bd-41f2-a1a9-492147b8b1b9.jpg\" rel=\"lightbox\" data-fancybox><img decoding=\"async\" width=\"877\" height=\"35\" src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/c1540e12-a0bd-41f2-a1a9-492147b8b1b9.jpg\" alt=\"c1540e12 a0bd 41f2 a1a9 492147b8b1b9\" class=\"wp-image-24777\" srcset=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/c1540e12-a0bd-41f2-a1a9-492147b8b1b9.jpg 877w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/c1540e12-a0bd-41f2-a1a9-492147b8b1b9-300x12.jpg 300w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/c1540e12-a0bd-41f2-a1a9-492147b8b1b9-770x31.jpg 770w\" sizes=\"(max-width: 877px) 100vw, 877px\" \/><\/span><figcaption class=\"wp-element-caption\">(Image Source: <a href=\"https:\/\/support.microsoft.com\/en-us\/office\/protect-yourself-from-macro-viruses-a3f3576a-bfef-4d25-84dc-70d18bde5903\">Microsoft<\/a>)<\/figcaption><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\">Executable Files:<\/h3>\n\n\n\n<p>One of the most dangerous types of files that hackers attach to emails is an executable file. If you open this type of file on your computer, it will almost certainly contain malicious software (also known as malware).<\/p>\n\n\n\n<p>If you are on a Mac computer, you also want to watch out for DMG files, which can also be used to install malware on your computer. &nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Compressed Files:<\/h3>\n\n\n\n<p>Certain compressed files are also not safe to open. The most common of these have ZIP or RAR extensions. A compressed file usually contains multiple files that have been made smaller, and you won\u2019t be able to know what they contain until you open them.<\/p>\n\n\n\n<p>If you open a compressed file, and it has an EXE file inside, you should only run it if you absolutely know what it is and who it came from.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Never Open Email Attachments with Double Extensions&nbsp;<\/h2>\n\n\n\n<p>Sometimes, email attachments will look safe at first glance, but if you look closer, you will notice the file name has two extensions. For example, a file name might look like an image, but it has a name like \u201cfile.jpg.exe\u201d. This means it\u2019s not a JPG file, but an EXE file because the last extension at the end of the file name is all that matters.<\/p>\n\n\n\n<p>Any file with a double extension is most likely a virus, and you should never open it to be safe. If you want to make sure, you can scan it first. Here\u2019s how:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Scan an Email Attachment on Windows 10<\/h2>\n\n\n\n<p>To scan an email attachment on a Windows 10 computer, download the file, but don\u2019t open it. Then right-click the file and select Scan with Microsoft Defender. When the scan is complete, you will see the results at the top of the Settings window.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><span data-src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/How-to-Scan-an-Email-Attachment-on-Windows-10.jpg\" rel=\"lightbox\" data-fancybox><img decoding=\"async\" src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/How-to-Scan-an-Email-Attachment-on-Windows-10.jpg\" alt=\"How to Scan an Email Attachment on Windows 10\" class=\"wp-image-24778\" width=\"666\" height=\"0\" srcset=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/How-to-Scan-an-Email-Attachment-on-Windows-10.jpg 829w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/How-to-Scan-an-Email-Attachment-on-Windows-10-300x225.jpg 300w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/How-to-Scan-an-Email-Attachment-on-Windows-10-770x579.jpg 770w\" sizes=\"(max-width: 829px) 100vw, 829px\" \/><\/span><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">What to Do If You Opened a Dangerous Attachment<\/h2>\n\n\n\n<p>If you accidentally opened an attachment with a dangerous file extension, you should change your email password right away. You should also contact your bank or credit card company and let them know what happened, so they will be on the lookout for suspicious charges to your accounts.<\/p>\n\n\n\n<p>Immediately after opening a dangerous attachment, you should run your computer\u2019s anti-virus software. Otherwise, you should download and install anti-virus software on your computer. To find out more, check out our list of the <a href=\"https:\/\/www.hellotech.com\/blog\/the-best-antivirus-software-for-windows-10-pcs\">best anti-virus programs for Windows PC<\/a>. If you think your computer is still infected with a virus, check out our guide on <a href=\"https:\/\/www.hellotech.com\/blog\/how-to-remove-malware-from-windows-10\">how to remove malware from a Windows 10 computer<\/a>.<\/p>\n\n\n<div style=\"margin-left: auto; margin-right: auto; text-align: center; \" id=\"hello-439260582\"><a data-no-instant=\"1\" href=\"https:\/\/www.hellotech.com\/tech-support\/for\/smart-home?utm_campaign=Blog-BannerAd_Smart-home_General&#038;utm_content=In-a-hellotech-home-technology-just-works\" rel=\"noopener nofollow sponsored\" class=\"adv-link\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2023\/03\/Smart-Home-General-In-a-HelloTech-Home-Technology-Just-Works-SQUARE.png\" alt=\"Smart Home General In a HelloTech Home Technology Just Works SQUARE\"  srcset=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2023\/03\/Smart-Home-General-In-a-HelloTech-Home-Technology-Just-Works-SQUARE.png 587w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2023\/03\/Smart-Home-General-In-a-HelloTech-Home-Technology-Just-Works-SQUARE-271x300.png 271w, https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2023\/03\/Smart-Home-General-In-a-HelloTech-Home-Technology-Just-Works-SQUARE-210x233.png 210w\" sizes=\"(max-width: 587px) 100vw, 587px\" class=\"advanced-ads-image-detect\" width=\"587\" height=\"650\"  style=\"display: inline-block;\" \/><\/a><\/div>","protected":false},"excerpt":{"rendered":"<p>According to the US Cybersecurity and Infrastructure Security Agency (CISA), \u201cmost users get viruses from opening and running unknown email attachments.\u201d The agency goes on to say that opening a malicious email attachment allows hackers to alter your files, steal your credit card information, or worse. Here\u2019s everything you need to know about which email attachments are safe to open and how to scan an attachment on a Windows 10 computer. Never Open Email Attachments Marked as Spam By default, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":24763,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[17593],"tags":[17708],"class_list":["post-5741","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-staying-safe","tag-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.10 (Yoast SEO v20.10) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Tell if an Email Attachment Is Malware - The HelloTech Blog<\/title>\n<meta name=\"description\" content=\"Here\u2019s everything you need to know about which email attachments are safe to open, and how to know before you click on them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Which Email Attachments Are Generally Safe to Open? - The Plug - HelloTech\" \/>\n<meta property=\"og:description\" content=\"According to the US Cybersecurity and Infrastructure Security Agency (CISA), \u201cmost users get viruses from opening and running unknown email attachments.\u201d\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open\" \/>\n<meta property=\"og:site_name\" content=\"The Plug - HelloTech\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/hellotech\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-01T07:41:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-19T03:53:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/Blog-which-email-attachments-are-safe-to-open_1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@HelloTech\" \/>\n<meta name=\"twitter:site\" content=\"@HelloTech\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/dec00225dd888a509740ace5e4d9de6c\"},\"headline\":\"Which Email Attachments Are Generally Safe to Open?\",\"datePublished\":\"2021-09-01T07:41:37+00:00\",\"dateModified\":\"2023-01-19T03:53:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open\"},\"wordCount\":1127,\"publisher\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/#organization\"},\"keywords\":[\"email\"],\"articleSection\":[\"Staying Safe\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open\",\"url\":\"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open\",\"name\":\"How to Tell if an Email Attachment Is Malware - The HelloTech Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/#website\"},\"datePublished\":\"2021-09-01T07:41:37+00:00\",\"dateModified\":\"2023-01-19T03:53:09+00:00\",\"description\":\"Here\u2019s everything you need to know about which email attachments are safe to open, and how to know before you click on them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hellotech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Which Email Attachments Are Generally Safe to Open?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#website\",\"url\":\"https:\/\/www.hellotech.com\/blog\/\",\"name\":\"The Plug - HelloTech\",\"description\":\"Turn to The Plug for informative tech news that you can use. \",\"publisher\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hellotech.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#organization\",\"name\":\"HelloTech\",\"url\":\"https:\/\/www.hellotech.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2018\/11\/HT-logo-revised-final.png\",\"contentUrl\":\"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2018\/11\/HT-logo-revised-final.png\",\"width\":1000,\"height\":174,\"caption\":\"HelloTech\"},\"image\":{\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/hellotech\",\"https:\/\/twitter.com\/HelloTech\",\"http:\/\/www.instagram.com\/hello_tech\",\"https:\/\/www.youtube.com\/channel\/UCIR-fbAKRfVuAbciDr2z4nQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/dec00225dd888a509740ace5e4d9de6c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cbb537d18df244ad7d57a3639d94ede5cd90bf1fb742392af5731beaf11ffeb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cbb537d18df244ad7d57a3639d94ede5cd90bf1fb742392af5731beaf11ffeb1?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Tell if an Email Attachment Is Malware - The HelloTech Blog","description":"Here\u2019s everything you need to know about which email attachments are safe to open, and how to know before you click on them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open","og_locale":"en_US","og_type":"article","og_title":"Which Email Attachments Are Generally Safe to Open? - The Plug - HelloTech","og_description":"According to the US Cybersecurity and Infrastructure Security Agency (CISA), \u201cmost users get viruses from opening and running unknown email attachments.\u201d","og_url":"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open","og_site_name":"The Plug - HelloTech","article_publisher":"http:\/\/www.facebook.com\/hellotech","article_published_time":"2021-09-01T07:41:37+00:00","article_modified_time":"2023-01-19T03:53:09+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2016\/08\/Blog-which-email-attachments-are-safe-to-open_1.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@HelloTech","twitter_site":"@HelloTech","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open#article","isPartOf":{"@id":"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open"},"author":{"name":"admin","@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/dec00225dd888a509740ace5e4d9de6c"},"headline":"Which Email Attachments Are Generally Safe to Open?","datePublished":"2021-09-01T07:41:37+00:00","dateModified":"2023-01-19T03:53:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open"},"wordCount":1127,"publisher":{"@id":"https:\/\/www.hellotech.com\/blog\/#organization"},"keywords":["email"],"articleSection":["Staying Safe"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open","url":"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open","name":"How to Tell if an Email Attachment Is Malware - The HelloTech Blog","isPartOf":{"@id":"https:\/\/www.hellotech.com\/blog\/#website"},"datePublished":"2021-09-01T07:41:37+00:00","dateModified":"2023-01-19T03:53:09+00:00","description":"Here\u2019s everything you need to know about which email attachments are safe to open, and how to know before you click on them.","breadcrumb":{"@id":"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.hellotech.com\/blog\/which-email-attachments-are-generally-safe-to-open#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hellotech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Which Email Attachments Are Generally Safe to Open?"}]},{"@type":"WebSite","@id":"https:\/\/www.hellotech.com\/blog\/#website","url":"https:\/\/www.hellotech.com\/blog\/","name":"The Plug - HelloTech","description":"Turn to The Plug for informative tech news that you can use. ","publisher":{"@id":"https:\/\/www.hellotech.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hellotech.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hellotech.com\/blog\/#organization","name":"HelloTech","url":"https:\/\/www.hellotech.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2018\/11\/HT-logo-revised-final.png","contentUrl":"https:\/\/www.hellotech.com\/blog\/wp-content\/uploads\/2018\/11\/HT-logo-revised-final.png","width":1000,"height":174,"caption":"HelloTech"},"image":{"@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/hellotech","https:\/\/twitter.com\/HelloTech","http:\/\/www.instagram.com\/hello_tech","https:\/\/www.youtube.com\/channel\/UCIR-fbAKRfVuAbciDr2z4nQ"]},{"@type":"Person","@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/dec00225dd888a509740ace5e4d9de6c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hellotech.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cbb537d18df244ad7d57a3639d94ede5cd90bf1fb742392af5731beaf11ffeb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cbb537d18df244ad7d57a3639d94ede5cd90bf1fb742392af5731beaf11ffeb1?s=96&d=mm&r=g","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/posts\/5741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/comments?post=5741"}],"version-history":[{"count":0,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/posts\/5741\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/media\/24763"}],"wp:attachment":[{"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/media?parent=5741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/categories?post=5741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hellotech.com\/blog\/wp-json\/wp\/v2\/tags?post=5741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}