Categories: Technology

Gmail Blocks Javascript Attachments for Security Reasons

Gmail will block you from attaching Javascript files as Google hopes to extend the steadily developing security of their services.

Gmail already blocks the attachment of certain file types in emails for this very same reason, and those with the .js tag at the end will just be the latest added to the existing list of blocked attachments.

Javascript files are to be blocked after February 13th

As of right now, it’s still possible to add Javascript attachments to emails. As February 13th looming, just around the corner, any individuals or businesses who may use Gmail to send Javascript files may want to start looking for an alternative way to send the files back and forth between colleagues so they aren’t left without a solution on the day.

Google doesn’t give a point by point clarification past the specified “security reasons” for blocking Javascript files.

However, they have highlighted that there are other alternative ways for sending Javascript files forward and backward if clients still need to send these legitimately.

The word legitimately alludes to part of Google’s reasoning as there must not be very many legitimate reasons for attaching this type of file to an email, and for the remaining few people as a collective whole that do have a need, it’s still entirely possible to share Javascript files through two other Google services which include both Drive and Google Cloud Storage.

Likewise, you can read Encrypt and password protect your Gmail message in a click

If after February 13th rolls around users are still trying to attach .js files to emails before sending, they will be met with an alert in the attachment link that states the file type has been blocked.

There will be a little “help” link which they can click on that will open a popup menu with more details and information why it was blocked.

This information will also be accompanied by other expandable dropdown links which inform the user of why certain email messages with or without attachments get blocked, so they can brush up on other reasons why an email not be allowed to go through if they care to know.

Already blocked file types:

.ADE, .ADP, .BAT, .CHM, .CMD, .COM, .CPL, .EXE, .HTA, .INS, .ISP, .JAR, .JSE, .LIB, .LNK, .MDE, .MSC, .MSP, .MST, .PIF, .SCR, .SCT, .SHB, .SYS, .VB, .VBE, .VBS, .VXD, .WSC, .WSF, .WSH

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

Recent Posts

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…

2 days ago

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…

2 days ago

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…

2 days ago

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…

2 days ago

Araneida Scanner – Hackers Using Cracked Version Of Acunetix Vulnerability Scanner

Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly based…

3 days ago

A Dark Web Operation Acquiring KYC Details TO Bypass Identity Verification Systems

A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…

3 days ago