Skip to main content

How they hack Gmail Account with Single Link

Your Gmail Account can Be hacked with a single Link

Alphabet Ink has told users not to open any Google Documents link that comes to their mail. After hacking accounts of thousands of users, Google has issued advances and asked the users to be cautious with such mail.
Such is your Gmail account hack A link to a Google Doc is now being sent to Gmail ID, which can be hacked by the user's account when opened. This mail comes in the name of the people in your contact list, on which click of your information reaches the hackers.

 Under this, hackers send Google Docs mail on which a new page opens on the click of the user, in which the account is then asked to login. In this way hackers are making their own target of Gmail users.
Google Doc has asked Twitter users to be cautious with such links. The company is working on the process of saving users from such phishing (email fraud).
Check if your Gmail messages are being forwarded without your permission

Gmail gives you the ability to forward your emails to another email address. There are situations where this might be handy, of course, but it can also be used by hackers to secretly read the messages you receive.

Go into your Gmail account settings, and select the “Forwarding and POP/IMAP” tab.


Where is your Gmail account being accessed from?

At the bottom of each webpage on Gmail, you’ll see some small print which describes your last account activity. This is available to help you spy if someone has been accessing your account at unusual times of day (for instance, when you haven’t been using your computer) or from a different location.

Clicking on the “Details” option will take you to a webpage describing the type of access and the IP address of the computer which logged your email account. Although some of this data may appear nerdy, it can be a helpful heads-up – especially if you spot a computer from another country has been accessing your email.

Secure your computer

It should go without saying, but this list would be unfinished without it. You need to properly secure your computer with up-to-date anti-virus software, security patches and so forth. If you don’t, you’re risking hackers planting malicious code on your computer which could spy upon you and, of course, your email.

You always want to be certain that your computer is in a decent state of health before you log into a sensitive online account, such as your email or bank account. That’s one of the reasons why I would always be very nervous about using a computer in a cybercafe or hotel lobby. You simply don’t know what state the computer is in, and who might have been using it before.

#1. Whenever possible, configure your Internet connection to always use HTTPS. This is the “https” that appears before the “www” in a Web address, and the https is preceded by a padlock icon.
3DFor Gmail, this works by clicking Settings in the top right; select the General tab, then hit Always use HTTPS, then save this setting. This option is not available for those who access email via Hotmail.
#2. Do not open unfamiliar emails. If you open one you think is from someone you know but realize it’s not, delete immediately. Do not click any links in the message or send the sender personal or banking information. Once you open that link, your computer could become infected by a phishing scam and your information stolen.
#3. Install anti-virus, anti-spyware and firewall on your computer and keep them updated. Automated updates are the ideal choice.
#4. Do not log into your accounts from an untrusted computer (e.g., at the coffee house, library), or one that you don’t maintain (e.g., friends’ and family’s). Even if you trust your friends and family, their computer could be infected from spyware.
#5. Make sure your passwords, plus security questions and answers are strong. Every six months, change your passwords. Never use the same password for different accounts. A strong password has upper and lower case letters plus numbers and punctuation, forming a non-English word.
For questions and answers, they don’t have to be true; false information cannot be researched or discovered on your Facebook page, such as the name of “your first pet” when you never had a pet: “Fuzzie-Glow” — who’s ever going to figure that out?
#6. Find out just how secure your passwords are. Some setups indicate strength with a rating of “weak” to “strong.” Always choose “strong.” If there’s no rating, go to How Secure Is My Password to see how fast your account can be hacked.
On the “How Secure” site, don’t type in your actual password if you’re skittish about doing that (even though the site is secure and will never release it anywhere), but type in something similar. So if your password is “catlover,” type in “horselover” and see what happens.
#7. Your password should not be on the list of the most popular passwords. Here is the full list. If yours is there, change it immediately, even if you must give up an easy-to-type sequence.
#8. Enable two-step verification if you use Google for any activity. The two-step adds additional security to a Google account. After entering your username and password, you’ll then enter in a code that Google sends out via voicemail or text when you sign in. This will make it harder for someone to guess a password.
#9. Use a password manager. This service eliminates the need to type in a password at log-in; log in with one click. A master password eliminates having to remember all your different passwords.
#10. You may think your password is unique because it’s a jumble of characters, but it may not be very strong simply because it’s not long enough. The longer that uniqueness, the more uncrackable the password will be.
#11 Use a virtual private network software to encrypt any wireless communications. Avirtual private network (VPN) is a network set up to communicate privately over a public network. For example: You occasionally want to or need to work from home and your employer knows that if you do, the data that travels between your PC and an office PC needs to be protected.
Another example is when you use public WiFi, knowing your wireless data can be sniffed out by criminals. Using a VPN solves that problem.
Hotspot Shield VPN service is a great option that protects your entire web surfing session, securing your connection on both your home internet network and public internet networks (both wired and wireless). 
Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning AmericaDisclosures.

Comments

Popular posts from this blog

Microsoft with Qualcomm snapdragon 835

Microsoft Qualcomm's ARM-Powered Windows 10 Laptops  Microsoft with Qualcomm announced last year that they will get support for integrated ARM chipsets, Snapdragon SoCs. While the companies said that the first PCs with ARM chipsets will be coming in 2017, there was never a specific timeline mentioned for the launch. Now, Qualcomm has revealed that the first such laptops will be launched in fourth quarter this year. Qualcomm in its latest investor call, announced that the first cellular laptop with Windows 10 and company's Snapdragon 835 SoC will be coming by the end of this year. Steve Mollenkopf, CEO of Qualcomm said that Snapdragon 835 processor is expanding into mobile PC designs that run Windows 10 and is scheduled to launch in the fourth quarter as per a Transcript of the earnings call.  As Windows 10 devices currently only run on x86 chipsets from INTEL or AMD these will be the first devices to run Windows 10 that don't have a processor with ...

Learning business (easy steps)

How to Start a Business Online is easy There is a  sequence of given steps you can follow to guarantee for your success when you starting a small business which is online . I have seen thousands of people start and grow successfull businesses by doing the simple steps.  Write copy that sells and sucess.Use search engines to drive traffic to your site from various countries .Establish an expert reputation for yourself great fully .Follow up with your customers and subscribers with email person to person .increase your income through back-end sales and upselling all time. Anyone, from newbie to seasoned online entrepreneur, can benefit from this process in learning how to start business online. Step 1: Find a need and fill it Most people who are just starting out make the mistake of looking for a product first, and a market second. To boost your chances of success, start with a market. The trick is to find a group of people who are searching for a solution to a pro...

Iron Man From UK with his Flying Unit

In TED Conference 2017 From UK 'Iron Man' demonstrates His Own flying suit A British inventor Richard Browning , who built an Iron Man model flight suit, has flown it  at the Ted event successfully .  He was inspired by his father, an aeronautical engineer who killed himself when Mr Browning was a teenager which sad part of his life.  He told the BBC in early interview that he always had a passion for making things and loved a challenge in life. "I did this entirely for the same reason that you might look at ,a mountain and decide to climb it - for the, journey and the challenge." He said he was also fascinated by the idea of human flight like an Iron man.  Richard Browning's short flight took place outside the Vancouver Convention Centre in front of a large crowd is moob making all around .  Since he posted the video Mr Browning has had huge interest in his flying suit building .  But he insists the project remains a bit of fun ...