Safety tips for handling email attachments and content downloaded from the Internet - Apple Support (2024)

Learn about safely handling email attachments and Internet downloads.

Safety tips for opening applications

Always use caution when opening (such as by double-clicking) files that come from someone you do not know, or if you were not expecting them. This includes email attachments, instant messaging file transfers, and other files you may have downloaded from the Internet. Any time that you download from a source that has not previously earned your trust, you should take extra precautions. This is because a downloaded file might have a name or icon that makes it appear to be a document or media file (such as a PDF, MP3, or JPEG), when it is actually a malicious application. A malicious application disguised in this manner is known as a "Trojan."

The following topics can help you safely handle email attachments and files downloaded from the Internet.

Identifying applications disguised as documents

If you are unsure about a particular file, you can use the Finder to see if a file is really an application. After selecting a file, either on the desktop or in a Finder window, you can use the Get Info command (Command-I) to look at the file's "Kind". When using the Column view in the Finder, this information is automatically displayed for the selected file. If you are expecting a document, but the Kind is something other than the expected document type, then you should avoid opening that file. Do not double-click its icon or use the Finder's Open (Command-O) command on the file, or otherwise open it.

If you are unsure of what the Kind for a particular document type should be, you can compare it with documents you may already have that are of that type, or you may be able to open an application directly and create and save a new document of that type. Use Get Info to display the Kind of your existing documents, and compare this with the Kind of the document you received or downloaded

For example, the following Kind types are documents:

There are a number of Kind types that identify applications. Use caution if the email attachment or downloaded file has a Kind that includes the word "Application" or is otherwise suspicious. The following is a list of other application types that also require caution:

  • Unix Executable File

  • Script

  • Terminal

  • TerminalShellScript

  • Jar Launcher Document

If you have installed third-party software, check the documentation to see if their files can contain macros, scripting languages, or executable code. If they do, then files of that Kind should also be handled with caution.

Download validation

Mac OS X 10.4 Tiger includes download validation. Several Apple applications use this feature to provide additional checking for content obtained from a network. If you open an attachment in Mail, and it is actually an application rather than a document, Mac OS X's download validation will warn you about unsafe file types, and you should cancel if you have any doubts about the file. If you save an attachment or drag it to a folder, use the Finder to inspect it as described above. If you were expecting a document, but the Finder indicates you received an application, do not open that file. Instead, delete it immediately.

If you navigate to a downloadable file with Safari (for example, by clicking a download link), Mac OS X's download validation will warn you about unsafe file types, and you should cancel if you have any doubts about the file. If you download a file by Command-clicking or selecting Download Linked File from a contextual menu, it will not be inspected by Mac OS X's download validation and it will not be automatically opened. You should inspect the downloaded file using the Finder as described above. If you were expecting a document and Finder indicates that it is an application, do not open that file. Instead, delete it immediately.

File quarantine

Mac OS X 10.5 Leopard and later improves on download validation by providing file quarantine. Mac OS X 10.5 remembers which content you obtained from a network. The first time you open a potentially unsafe file in Finder, in Spotlight, or from the Dock, the file quarantine feature will warn you about unsafe file types. You should cancel if you have any doubts about the file.

Distinguishing legitimate and malicious applications

Where you got the file is the most important indicator. Only download and install applications from trusted sources, such as well-known application publishers, authorized resellers, or other well-known distributors. It is also advisable to use antivirus software to scan any files before installation. A selection of third-party products may be found at the Macintosh Products Guide.

Published Date:

Safety tips for handling email attachments and content downloaded from the Internet - Apple Support (2024)
Top Articles
Before The Final Bell, A Critical Look At Billions One of Peak TV’s Most Frustrating — But…
FlexDirect | In-credit interest current account
Analysis: Blue Jackets prospects get the job done in Buffalo | Columbus Blue Jackets
Patelco New Car Loan Rates
K-Active – Jetzt kaufen bei SVG
Cover Ny Post Today
Coverwood Terriers For Sale
South Bend Weather Underground
Silver Tear Husks
Self-Help for Sobriety Without Relapse
Prestige Home Designs By American Furniture Galleries
Morse Road Bmv Hours
Jimmy John's Order Delivery
Wink Ice Cream Net Worth
Georgia Southern vs. Ole Miss Prediction and Picks - September 21, 2024
A Proven Plan for Financial Success | RamseySolutions.com
Safety Jackpot Login
90 Days From February 28
Why Do Two Porsche Bucket Seats Cost More Than An Entire Boxster And An Entire Cayenne Combined? - The Autopian
The Best Massage Guns
Jobs Hiring 18 Year Olds Near Me
How to Grow and Care for Four O’Clock Flowers | Gardener’s Path
Canvaschamp Login
Wild West 2013-12 - PDF Free Download
Wbay Tv Weather Forecast
Walgreens Colesville
Madden 24 Repack
Monster Hunter Rise Steam Unlocked
Walmart Tire And Lube Center Near Me
George The Animal Steele Gif
Urban Blight Crossword Clue
Transformers Age Of Extinction Soap2Day
Craigslist Oneonta New York
Back Pages Chattanooga
Ukraine-Russia war: Zelenskyy says 'victory plan' is ready as Russia counterattacks Kyiv's advances
Citymd West 104Th Urgent Care - Nyc Photos
Please Help Me: What to Do When You Need Help
Marketplace Palm Coast
Effingham Bookings Florence Sc
Prot Pally Wrath Pre Patch
Ellerie Marie Race
R/Mp5
Somerset Daily American Newspaper Obituaries
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Indiana Wesleyan Transcripts
Newcomer Funeral Home Beavercreek Obituaries
Lenscrafters Westchester Mall
Kobalt Kst 180-06 Parts
Learnnow Pizza Hut
Autopartes usadas en Sun Valley 91352 | LKQ Pick Your Part
Litquidity Compensation Survey
Latest Posts
Article information

Author: Patricia Veum II

Last Updated:

Views: 6077

Rating: 4.3 / 5 (44 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Patricia Veum II

Birthday: 1994-12-16

Address: 2064 Little Summit, Goldieton, MS 97651-0862

Phone: +6873952696715

Job: Principal Officer

Hobby: Rafting, Cabaret, Candle making, Jigsaw puzzles, Inline skating, Magic, Graffiti

Introduction: My name is Patricia Veum II, I am a vast, combative, smiling, famous, inexpensive, zealous, sparkling person who loves writing and wants to share my knowledge and understanding with you.