HTML email: Difference between revisions

Content deleted Content added
«+"Security vulnerabilities ==", -"*", -"*", "*" → "=="»
Security vulnerabilities: «"The viewing of embedded external content" → "If an email contains inline content from an external server", +"the server", "and" → "revealing that an email address is real (so that ti can be tarwhen the message is
Line 32:
HTML allows for a link to have a different target than the link's text. This can be a security issue for users, who may be fooled into believing that a link points to the website of an authoritative source (such as a bank) and unintentionally [[phishing|revealing personal details to a scammer]].
 
TheIf viewingan ofemail embeddedcontains externalinline content from an external server, such as an [[Digital image|image]], inthe an email,server can alert a third party that the e-mail has been opened. This is a potential privacy risk, revealing that an email address is real (so that it can be targeted in the future) and when the reasonmessage forwas whichread. For this reason, some e-mail clients do not load external images until requested to by defaultthe user.
 
Most [[E-mail spam]] is sent in HTML so spam filters (such as [[Spamassassin]]) give high spam scores to HTML messages.