Posts Tagged ‘Mobile phone’

How to stop your Gmail account being hacked

Published by pratyushkp on June 3rd, 2011 - in Social, Technology

Image via CrunchBase

Original Post from Sophos. Author – Graham Cluley

As has been widely reported, high profile users of Gmail – including US government officials, reporters and political activists – have had their email accounts hacked.

This wasn’t a sophisticated attack against Google’s systems, but rather a cleverly-crafted HTML email which pointed to a Gmail phishing page.

Victims would believe that they had been sent an attachment, click on the link, and be greeted by what appeared to be Gmail’s login screen. Before you knew it, your Gmail username and password could be in the hands of unauthorised parties.

So, what steps should you take to reduce the chances of your Gmail account being hacked?

  1. Set up Two step verification
  2. Check if your Gmail messages are being forwarded without your permission
  3. Where is your Gmail account being accessed from?
  4. Choose a unique, hard-to-crack password
  5. Secure your computer
  6. Why are you using Gmail anyway?

1. Set up Two step verification

The hackers who broke into high profile Gmail accounts grabbed usernames and passwords. So, an obvious thing to do would be to make Gmail require an extra piece of information before allowing anybody to access your account.

Google provides a facility called “two step verification” to Gmail users, which provides that extra layer of security. It requires you to be able to access your mobile phone when you sign into your email account – as they will be sending you a magic “verification” number via SMS.

The advantage of this approach – which is similar to that done by many online banks – is that even if cybercriminals manage to steal your username and password, they won’t know what your magic number is because they don’t have your phone.

Google has made two step verification easy to set up.

Once you’re set up, the next time you try to log into Gmail you’ll be asked for your magic number after entering your username and password. Your mobile phone should receive an SMS text message from Google containing your verification number.

Let’s just hope the bad guys don’t have access to your mobile phone too..

Here’s a video from Google where they explain two step verification in greater detail:

You can also learn more about two step verification on Google’s website.

By the way, note that two step verification doesn’t mean that your Gmail can’t ever be snooped on by remote hackers. They could, for instance, install spyware onto your computer which could monitor everything that appears on your screen. But it’s certainly a good additional level of security for your Gmail account, and one which will make life much more difficult for any cybercriminal who might be targeting you.

2. Check if your Gmail messages are being forwarded without your permission

Gmail gives you the ability to forward your emails to another email address. There are situations where this might be handy, of course, but it can also be used by hackers to secretly read the messages you receive.

Go into your Gmail account settings, and select the “Forwarding and POP/IMAP” tab.

If your emails are being forwarded to another address, then you will see something like the following:

That’s fine if you authorised for your emails to be forwarded to that email address, but a bad thing if you didn’t.

If your messages are not being forwarded you will see a screen more like this:

Hackers want to break into your account not just to see what email you’ve received up until their break-in. Ideally, they would like to have ongoing access to your email, even if you change your password or enable two step verification. That’s why it’s so important to check that no-one has sneakily asked for all of your email to be forwarded to them.

3. Where is your Gmail account being accessed from?

At the bottom of each webpage on Gmail, you’ll see some small print which describes your last account activity. This is available to help you spy if someone has been accessing your account at unusual times of day (for instance, when you haven’t been using your computer) or from a different location.

Clicking on the “Details” option will take you to a webpage describing the type of access and the IP address of the computer which logged your email account. Although some of this data may appear nerdy, it can be a helpful heads-up – especially if you spot a computer from another country has been accessing your email.

4. Choose a unique, hard-to-crack password

As we’ve explained before, you should never use the same username and password on multiple websites. It’s like having a skeleton key which opens every door – if they grab your password in one place they can try it in many other places.

Also, you should ensure that your password is not a dictionary word, and is suitably complex that it’s hard to break with a dictionary attack.

Here’s a video which explains how to choose a strong password, which is easy to remember but still hard to crack:

(Enjoy this video? You can check out more on the SophosLabs YouTube channel and subscribe if you like)

Don’t delay, be sensible and make your passwords more secure today

And once you’ve chosen a safer password – keep it safe! That means, don’t share it with anyone else and be very careful that you’re typing it into the real Gmail login screen, not a phishing site.

5. Secure your computer

It should go without saying, but this list would be unfinished without it. You need to properly secure your computer with up-to-date anti-virus software, security patches and so forth. If you don’t, you’re risking hackers planting malicious code on your computer which could spy upon you and, of course, your email.

You always want to be certain that your computer is in a decent state of health before you log into a sensitive online account, such as your email or bank account. That’s one of the reasons why I would always be very nervous about using a computer in a cybercafe or hotel lobby. You simply don’t know what state the computer is in, and who might have been using it before.

6. Why are you using Gmail anyway?

Okay, I don’t really mean that. But I do mean, why are you storing sensitive information in your Gmail account?

The news headlines claim that senior US political and military officials were being targeted by the hackers. Surely if they had confidential or sensitive data they shouldn’t have that in their webmail account? Shouldn’t that be on secure government and military systems instead?

Always think about the data you might be putting on your web email account – because if it’s only protected by a username and password that may actually be less security than your regular work email system provides.

  • How to stop your Gmail account being hacked (nakedsecurity.sophos.com)
  • The Truth Behind Gmail “Hack” (fastcompany.com)
  • Even Gmail Can Get Hacked (webpagefx.com)
  • Chinese Gmail Attack Targets ‘Senior’ U.S. Officials (techland.time.com)
  • Top 10 Things You Can Do to Protect Your Gmail Account (blogs.wsj.com)
  • Google: Gmail Attack from China Affects ‘Senior U.S. Government Officials’ (techland.time.com)

Over 10 Million Scammed On Facebook

Published by pratyushkp on April 10th, 2011 - in Social, Technology

Were invited to a bogus event

Spammers have invited over 10 million Facebook users to fake events in yet another attempt to generate income from online survey scams according to a report by the IT security and data protection firm Sophos. Even as we file this report, the scam is in progress and several thousand unwitting Facebook users are falling prey to it.

One of the event known as “Who blocked you from his friend list?” has already tricked over 165,000 people into signing-up, with an astounding 10.3 million users still deciding whether or not to respond. Scammers embed instructions into the ‘More info‘ section of the event’s summary and this convinces Facebook users to unwittingly visit the webpages for online surveys or competitions, which are a source of revenue for the scammers by means of commission. Sometimes, users are asked to provide a mobile phone number, and if the user is naive enough to provide it, he/she will most probably end up getting signed up for an expensive premium rate service.

Senior Technology Consultant at Sophos, Graham Cluley said, “These spammed-out event invitations and links to survey scams are one of the biggest nuisances on Facebook right now, impacting millions of users every day. It would be great if Facebook was being more proactive in shutting down these obviously bogus events, as currently it’s far too easy for the scammers to fill their pockets through schemes like this.”

In case you are affected by this scam, then you must cancel your reservation for the event. You must also notify your friends that you have shared a bogus link with them and/or invited them to a fake event. In case you have submitted your mobile phone number, you must contact your mobile service provider and inform them to keep any bogus charges from appearing in your mobile account.

The moral of the story is that Facebook users must beware of such suspicious events and think twice before accepting invitations from an unknown source.

Source : http://www.techtree.com/India/Techtree_Notes/Over_10_Million_Scammed_On_Facebook/551-115050-889.html

  • FB Survey – Bogus Event Requests (twtface.wordpress.com)
  • Millions of Facebook users invited to scam events, as spammers exploit social network (nakedsecurity.sophos.com)
  • In spite of scam, Facebook not ‘closing’ today (msnbc.msn.com)
  • Spammers Using Facebook Events to Trick Users (nytimes.com)
  • Spammers Now Using Facebook Events to Trick Users (readwriteweb.com)
  • WARNING: Facebook Events Become Security Frontier (allfacebook.com)
  • Bogus CNN video scams Facebook users (eclectomania.wordpress.com)
  • Facebook closes today … NOT! (go.theregister.com)
  • Italian Facebook likejacking targets more than 107,000 users and Facebook account confirmation scam returns (nakedsecurity.sophos.com)
  • My Facebook wall has been viewed X times – viral survey scam spreads rapidly (nakedsecurity.sophos.com)
© Social Media Blog

Ad Plugin made by Free Wordpress Themes