A brief technical introduction to some of the most common (and dangerous) attacks you receive every day in your Inbox: how do they work, what are the consequences, how can you avoid them?

Photos