“The flow chart basically walks a user through the analysis of an email. It begins by identifying the sender and then checking consecutively if the email contains links or attachments and if it requests personal information.
The red end points define potentially dangerous emails while the blue end point an email that is likely safe.”