Software has ability to capture e-mail activities and can be used malicious purposes.
See complete list of properties