Identify and handle malicious messages - PDF EN