Content deleted Content added
«+"Security vulnerabilities ==", -"*", -"*", "*" → "=="» |
→Security vulnerabilities: «"The viewing of embedded external content" → "If an email contains inline content from an external server", +"the server", "and" → "revealing that an email address is real (so that ti can be tarwhen the message is |
||
Line 32:
HTML allows for a link to have a different target than the link's text. This can be a security issue for users, who may be fooled into believing that a link points to the website of an authoritative source (such as a bank) and unintentionally [[phishing|revealing personal details to a scammer]].
Most [[E-mail spam]] is sent in HTML so spam filters (such as [[Spamassassin]]) give high spam scores to HTML messages.
|