Analysis
The advent of the internet has changed the way in which technology was being used to support businesses as well as personal needs of users worldwide. Little did people realize that the internet would establish itself as a powerful facilitator of the needs of the common man in such a short period of time. However the same facilities that the Internet offers can also be a potential source for dissemination of our private information without us even knowing about it.
Email security threats may be of many different types. Email security can be compromised by spoofing, identity theft, attacks by modifying existing messages, and imposters [Kangas, 2004]. Hackers may use any or all of these methods to break into a user's computer.
Email security
Email is one of the most potent sources for losing our data because most people are complacent about enforcing email security. Email software is also the most used software among computer users. Hence, any vulnerability of popular email software can be easily exploited by unscrupulous elements to gain entry into the private data of a lot of people. Hence, it is very important that every one use secure email clients for receiving and sending emails. A lot of reputed email clients are available and the