Gmail Users Need To Be Careful With New Cyber Phishing Technique
There's a new Gmail-related news that users are definitely not going to be happy about. A new phishing technique has been making rounds online that composes convincing emails by copying your past messages and attachments that have been browsed through by hackers.
According to a post by Mark Maunder, The CEO of popular WordPress security plugin Wordfence, they discovered the cyberattack. The attack works in two main parts. First, the hacker will compromise your Gmail account and browse through your list of contacts. The hacker then sends a seemingly authentic email with an attachment which appears to be a PDF with a familiar file name. The attacker will also mimic subject lines from previous emails. The second part is that the PDF is actually a smartly camouflaged image which will bring you to a new tab with a functional Gmail sign-in page once the attachment is clicked.
The attack's Gmail sign-in page is very convincing that a lot of users, including experienced technical users, are tricked into immediately providing their login credentials.
If you are looking to protect Gmail account from, which you definitely should, you need to be extra cautious when you check the location bar. Checking to see if you are on 'accounts.google.com' in the location bar is not enough. If you happen to see "data:text/html...," you're in for a possible trouble. Wordfence says that users need to verify the protocol, then verify the hostname. Users must be certain that there isn't anything before the hostname 'accounts.google.com' other than "https://" and the green lock symbol.
According to Aaron Stein from Google Communications, Google is aware of the issue and is working to strengthen its defense from phishing attacks. Other security measures users can apply is the two-step verification and check Gmail sign-in history to check time, dates, and IP addresses for suspicious activities.
Suspected Copyright Pirates Will Get Friendly Email Warnings
ISPs will be handing out surprisingly friendly emails to copyright pirates starting on January 17.
Is KickAss Torrents Back For Good?
The wildly popular peer-to-peer sharing site Kickass Torrents, also known as KAT, is back. The site is expecting to evade future shutdowns.
HTC Will Build Another Flagship Phone, Even After Billion-Dollar Deal with Google
HTC is showing signs of revival with the announcement of $1.1 billion smartphone business deal with Google.
Google Replacing Defective Nexus 6Ps with Pixel XL for Free
Owners of defective Nexus 6P units in the US and Canada are now receiving Google Pixel XL as free replacement.
Google Pixel Users on Oreo Complain of Unexpected Mobile Data Shutdown
Google has acknowledged mobile data issues with Pixels running on Oreo update via its official product forums.
MORE IN ITECHPOST
How Scars are Formed and How to Remove It
Scar formation is a result of a biological process in skin after an injury or trauma. It is formed when the dermis layer of the skin is damaged. It is our body's way to repair tissues and organs and is a natural part of the healing process. A scar tissue is composed of the same type of collagen it is replacing with. Scars lacks elasticity compared to normal tissue. There are different degrees of scarring depending on the injury the tissue is subjected to.
Choice of Right Tools To Practice Forex Trading
Simply put, Forex trade is the exchange of national currencies between two entities at an agreed, fixed rate. The entities can be individuals, companies or central banks, and the rate is always dynamic—it keeps fluctuating all the time.
Astronomers Discover 'Monster' Galaxy Lurking in Distant Dust Clouds
UMass Amherst, Arizona, Australian team finds new evidence for huge deep space objects
'The Outer Worlds' Pre-Order Guide Plus Game Details Roundup
"The Outer Worlds" is only days away, and fans can pre-order the game.