Skip to main content

How to protect your email from being hacked and from being spammed.

Here are some simple dos and don'ts that will keep your email accounts secured from hackers.

First and foremost implement two step verification processes for all emails like Gmail, Yahoo! and Outlook. This will help you protect your account even if the password is compromised. Also while using an enterprise email service - use PGP to encrypt emails which may contain confidential information.

 Never post your email account address on social networking websites like Facebook and Twitter or make them public for everyone. Organized cyber criminal use software that harvest email addresses which are further sold to spammers online.

Instead of posting your email account on forms and websites as-it-is. You should avoid using the "@" and ".". So instead of writing my email as smit@hacker.com, I write it as smit[at]ha cker.com This is because hackers run automated scripts to gather information about particular domains which copies and text with the "@" symbol.

Never type your email with the keyboard. This will protect you from becoming prey to a key logger which takes up your password and other critical banking details. The option to be used while typing the password is - windows on-screen keyboard which you can start by pressing the window key + U button together.

As a parent, you must have joint email accounts with your kids and monitor the emails very closely as majority of the cyber crimes occur due to lack of information on the victim's side. It might also save your children from being cyber bullied by strangers.

Do not use simple passwords for your email. Always have a complex password with letters, special characters and numeric. For Example: If my password is smit I will write it as "$m17", now this is a complex password which is difficult to brake.

Always be careful while clicking on Bitly or any other URL shortened link which might come in your mailbox. The short links don't give the exact description and they might lead you to a website with malware and virus. So the best way to open a shortened link is by using the incognito window and once if appears safe, you can re-open in your normal browser.

Never have the same password for 2 or more email addresses. This is one common mistake that a lot of people do as a result of which it becomes easy for hackers to crack into multiple accounts once they get and access to one account.

You should use disposable emails to register on websites which need verification but do not have genuine certification on their website. You can use websites like guerrillamail.com and mailinator.com. This is the best way to protect your account from spammers.

Never open email attachments from unknown sources. These attachments generally contain viruses which even good antivirus can easily be bypassed with the advanced metamorphic nature of malware today.

I rest my case. Follow the above remedies to the letter and maintain safety.





Comments

Popular posts from this blog

Beginning of Hacking

Before Hollywood took the hacking phenomena under its wing, unless you were a clued-in techy, the world of hacking would be unfamiliar territory. In recent years, movies like The Girl with the Dragon Tattoo, The Matrix and The Italian Job have managed to glamourize the high-tech thrill of breaking into servers, cracking door codes and hijacking security networks. But before television brought the hacker technology into our general knowing, hacking was still an occurring reality for some. So what is the history of hacking and where did today's sophisticated hacking begin? Late 1950s – The MIT Start Off with a Bang Hacking wasn’t always about computers. In fact, the first ‘hackers’ were roof and tunnel hackers, which the Massachusetts Institute of Technology was instrumental in introducing. These were people who entered roof and utility tunnel spaces without authorization, in other words getting into a place they shouldn’t be in – which is where computer hacking go...

Internet of Threats!

T he Internet of Things (IoT) is continuing to gain traction with an ever-increasing number of connected devices coming to market. But as tech-savvy consumers begin investing in their first devices for a connected home, what is to stop them becoming a cyber attacker's next target? While still uncommon, we know that cyber attackers are going after connected consumer devices, demonstrated on a massive scale by the group of Russian hackers who published thousands of live-streaming webcam footage from over 250 countries. Unless the manufacturers of connected devices take a holistic approach to bolstering their cyber security efforts, these types of attacks will increase in number. To gain a greater understanding of the cyber security risks that consumers could be exposing themselves to, research was conducted into the cyber security posture of six ‘always-on’ consumer IoT devices. The results were unsettling. Veracode carried out a set of uniform tests across all the...

Microsoft Keeps Backup of Your Encryption Key on its Server — Here's How to Delete it!!

Have you recently purchased a Windows computer? Congratulations! As your new Windows computer has inbuilt disk encryption feature that is turned on by default in order to protect your data in case your device is lost or stolen. Moreover, In case you lost your encryption keys then don't worry, Microsoft has a copy of your Recovery Key. But Wait! If Microsoft already has your Disk Encryption Keys then what’s the use of using disk encryption feature? Doesn't Encryption mean  Only you can unlock your disk ? Microsoft Probably Holds your Encryption Keys Since the launch of Windows 8.1, Microsoft is offering disk encryption as a built-in feature for Windows laptops, Windows phones and other devices. However, there is a little-known fact,  highlighted  by The Intercept, that if you have logged into  Windows 10  using your Microsoft account, your system had automatically uploaded a copy of your recovery key to Microsoft’s server...