Gmail Users Need To Be Careful With New Cyber Phishing Technique
There's a new Gmail-related news that users are definitely not going to be happy about. A new phishing technique has been making rounds online that composes convincing emails by copying your past messages and attachments that have been browsed through by hackers.
According to a post by Mark Maunder, The CEO of popular WordPress security plugin Wordfence, they discovered the cyberattack. The attack works in two main parts. First, the hacker will compromise your Gmail account and browse through your list of contacts. The hacker then sends a seemingly authentic email with an attachment which appears to be a PDF with a familiar file name. The attacker will also mimic subject lines from previous emails. The second part is that the PDF is actually a smartly camouflaged image which will bring you to a new tab with a functional Gmail sign-in page once the attachment is clicked.
The attack's Gmail sign-in page is very convincing that a lot of users, including experienced technical users, are tricked into immediately providing their login credentials.
If you are looking to protect Gmail account from, which you definitely should, you need to be extra cautious when you check the location bar. Checking to see if you are on 'accounts.google.com' in the location bar is not enough. If you happen to see "data:text/html...," you're in for a possible trouble. Wordfence says that users need to verify the protocol, then verify the hostname. Users must be certain that there isn't anything before the hostname 'accounts.google.com' other than "https://" and the green lock symbol.
According to Aaron Stein from Google Communications, Google is aware of the issue and is working to strengthen its defense from phishing attacks. Other security measures users can apply is the two-step verification and check Gmail sign-in history to check time, dates, and IP addresses for suspicious activities.
Suspected Copyright Pirates Will Get Friendly Email Warnings
ISPs will be handing out surprisingly friendly emails to copyright pirates starting on January 17.
Is KickAss Torrents Back For Good?
The wildly popular peer-to-peer sharing site Kickass Torrents, also known as KAT, is back. The site is expecting to evade future shutdowns.
HTC Will Build Another Flagship Phone, Even After Billion-Dollar Deal with Google
HTC is showing signs of revival with the announcement of $1.1 billion smartphone business deal with Google.
Google Replacing Defective Nexus 6Ps with Pixel XL for Free
Owners of defective Nexus 6P units in the US and Canada are now receiving Google Pixel XL as free replacement.
Google Pixel Users on Oreo Complain of Unexpected Mobile Data Shutdown
Google has acknowledged mobile data issues with Pixels running on Oreo update via its official product forums.
MORE IN ITECHPOST
Fitness Expert, Jolene Cherry, Explains How to Build Good Fitness Habits Using Tech
Cherry explores several different technology gizmos and gadgets to keep in mind when the initial burst of fitness motivation runs dry.
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
Eight Must-Have Tools to Keep Your Car Out of Garage
We all dread taking our car to a garage for repairs. We might just want to avoid the inconvenience of being off the road or maybe the costs associated, which can even lead to knock-on effects on things like our holiday plans.
6 Hacks for Students to Choose a Laptop While on a Budget
The modern world tries to drown us in the sea of choices. One can’t simply buy a laptop - there are hundreds of laptops around and sometimes our budget becomes the only real limitation we can rely on. But how to choose other parameters to get the best laptop possible?