The fourth type of hacking is email hacking and in this type hackers attempt to an email address without permission. The electronic mail is more used than the traditional mail boxes and that’s due to the evolution, emails are used today mostly as a form of communication due to its options. There are two types of services web-based: an email service which is open-based and that means this type
deliver email accounts to any customer, some of them are for free but some request fees and the other type give email accounts controlled and organized by companies for employees, and in general students and members only. There are three big forms of attacks: spam, virus or phishing.
The first type of attack is realized by delivering huge email broadcasts which contains a hidden IP address or email addresses, a spam message usually contains something very attractive such as low-priced travel tickets, job offers and in general any kind of offers and to be more attractive spammers use a lot of colors and photos. Some of the hack victims may open the magic message, read it and get
really interested in its content.
The big fun for hackers is when they hit a big company and hold their sending email and IP address. If the masters of email hacking choose a company and hack it the company would be destroyed and their internet connection would be down and stopped by its Internet Service Provider (ISP) and none of their emails would reach the destinations.
Another method used by hackers to get unauthorized access into someone’s email is by sending them an email that hides a virus in the background, the Sobig virus is often used because it’s a modern technology that creates a spamming infrastructure because it’s taking over unwilling PC members. The third way hackers follow to hack and email is called phishing and it consist of collecting
sensible and valuable information from others emails such as credit card numbers, user names and passwords and many hackers use this method to get money. The risk of being hacked by phishing is very high in those days especially on Facebook and Twitter where you give some precious information about your person, social media is not as kind as it seems and there are a lot of well hidden secrets behind them.
There are three types of phishing, the first type is known as Spear Phishing and it’s used to attack target people, companies and organizations, 91% of email attacks are made with this kind of phishing and most of them are successful. The next phishing type is called Clone Phishing and its adepts clone emails by creating identical ones and the last type of phishing is known as Whaling, people use this
term to describe a high profile attack made using phishing method.
An interesting way to hack someone’s account you can apply only by knowing his/her phone number, let me explain how, when a person is making a new email address its recommended to attach their phone number for security reasons and in case you forget your email password you can set a new one if you add your phone number, so most of the people add their phone numbers. It’s enough to know your victim’s phone number and email address to start.
First, go to the login page and type the email where they ask you to do it and after that select the ‘’need help?’’ option and select “Get a verification code on my phone: [mobile phone number]” and the sms will be sent to the phone number, the sms usually is formed from six letters. After that, you should send a message to the person’s number pretending you are Google and the message should be
“Google has detected unusual activity on your account. Please respond with the code sent to your mobile device to stop unauthorized activity.” the victim Will believe this message and send you the verification code which you will enter lately. After entering the code set up a new password and we are done, check everything you want on that account.
*Note: this method works only with Gmail accounts and it will be successful if the victim doesn’t know your number, in case the number is known by the victim try to send the message from an unknown number.
Every one of us must take measures immediately to protect our email addresses, a big company like Yahoo!, Gmail or Hotmail treat their customers with curiosity by offering them high security, each one of them will notify you immediately if there is something strange and ask you to check your email or set up your password. Another good idea is to make a complicated email address with numbers but make sure you don’t forget it! Also you should choose a complex password with numbers and big and small letters (I recommend creating a password with more than 12 characters). Your computer should be protected as well, make sure you get a professional, original and high quality antivirus software like Avira or Avast, they might offer you a short testing period and after that they will ask you to buy it, do it, it totally worth! Even a hacker should protect his computer because you never know what could happen in the next second.
Choosing a difficult security question will increase your security rate but be careful; you should remember the answer even after ten years or more if it’s needed, this option could save your email’s life because no one will be able to surf the internet in hope to find something very personal about you. However, email hackers have a lot of success those days by simply getting into more and more email accounts...
No comments:
Post a Comment