New Gmail Phishing Technique Is Cleverly Dangerous
There is a highly effective Gmail phishing technique that has long been discovered since last year but has just recently gained popularity due to the growing reports about it. It is stealing log-in credentials and is having a wide impact even among experienced technical users.
About The Phishing Attack
According to an article at Word Fence, the highly effective phishing technique is hitting not only Gmail accounts but other services as well. However, it is currently being used to target Gmail customers and there have been numerous reports already.
It is said that the attack works with an attacker sending an email to your Gmail account and that email may either come from someone you know who has had their account hacked using this technique or may include something that looks like an image of an attachment you recognize from the sender. Upon clicking the image, a new tab opens up and you are prompted by Gmail to sign-in again, which you will also notice at the location bar and see:
Once you signed in, your Gmail account has been compromised, giving the attacker full access. After that, the attacker will quickly log in to your account, because researchers suspect that it may be automated or they may have a team on standby 24/7 to process accounts once they are compromised.
Having your account hacked is quite dangerous. The hackers have full access to all your emails, including sent and received, and may download the whole lot. Furthermore, they could also compromise a wide variety of other services that you use by the password reset mechanism including other email accounts and many more.
How To Protect Yourself From The Phishing Attack
First is to check the location bar. If you do so see this line:
Click it and do some further inspection which you will notice is that it's a very long string of text. Compared to the safe one, the line should be like this:
However, if you are still in doubt, you can also do the second step, which is "enable two-factor authentication." Enabling the two-factor authentication makes it more difficult for an attacker to sign in into a service that you use, even if they manage to steal your password using the phishing technique.
Tinder Launches "Select" For Celebs And Beautiful People Only
Unbeknownst to many, Tinder has secretly launched a mysterious group or section called "Select" dedicated for VIPs only, where only the rich, famous and beautiful are invited.
Your Android Phone May Be Infected With Malware
A study identified severe malware infection in 38 Android devices that are said to have been pre-installed.
Facezam: Facial Recognition App That Matches Pictures Of Strangers With Their Facebook Profile
Facezam is a facial recognition app that has a 70 percent accuracy rate of tracking down anyone on Facebook just by analyzing a picture of their face.
HTC Will Build Another Flagship Phone, Even After Billion-Dollar Deal with Google
HTC is showing signs of revival with the announcement of $1.1 billion smartphone business deal with Google.
Google Replacing Defective Nexus 6Ps with Pixel XL for Free
Owners of defective Nexus 6P units in the US and Canada are now receiving Google Pixel XL as free replacement.
MORE IN ITECHPOST
How Scars are Formed and How to Remove It
Scar formation is a result of a biological process in skin after an injury or trauma. It is formed when the dermis layer of the skin is damaged. It is our body's way to repair tissues and organs and is a natural part of the healing process. A scar tissue is composed of the same type of collagen it is replacing with. Scars lacks elasticity compared to normal tissue. There are different degrees of scarring depending on the injury the tissue is subjected to.
Best Alternative Tweaked App stores for iOS
The usage of mobile apps is increasing from day to day. Tweaked app stores are used to get the apps which are unofficial that could be used on iOS.
Ancient Stars Shed Light on Earth's Similarities to Other Planets
A new method used to study planets' geochemistry implies that Earth is not unique
Internet Archive Added Another 2,500 MS-DOS Games So You Can Relive Your 90s Gaming Life
Remember your old PC games? You can now play them again and look back on your early gaming days