So far, this book has discussed many of the components of an email message and some indicators that can help us determine the validity of a message. The last chapter focused on content and various ways that content can be used as an attack method. Email messages can contain far more than just content. Often, messages are sent with links or attachments to help convey additional information to support the content in the main body. This chapter focuses on links and how attackers use them to exploit and attack victims.
What Is a Link?
A ...