Email remains a central communication medium, yet its long-standing design and interface conventions continue to enable deceptive attacks. This research note presents a structured list of 42 email-based deception techniques, documented with 64 concrete example implementations, organized around the sender, link, and attachment security indicators as well as techniques targeting the email rendering environment. Building on a prior systematic literature review, we consolidate previously reported techniques with newly developed example implementations and introduce novel deception techniques identified through our own examination. Rather than assessing effectiveness or real-world severity, each entry explains the underlying mechanism in isolation, separating the high-level deception goal from its concrete technical implementation. The documented techniques serve as modular building blocks and a structured reference for future work on countermeasures across infrastructure, email client design, and security awareness, supporting researchers as well as developers, operators, and designers working in these areas.
Building similarity graph...
Analyzing shared references across papers
Loading...
Maxime Fabian Veit
Mattia Mossano
Tobias Länge
Building similarity graph...
Analyzing shared references across papers
Loading...
Veit et al. (Thu,) studied this question.
www.synapsesocial.com/papers/69d896a46c1944d70ce0835f — DOI: https://doi.org/10.5445/ir/1000191981
Synapse has enriched 5 closely related papers on similar clinical questions. Consider them for comparative context: