Saturday 5 October 2013

EMAIL HACKING

Do U Think If Your Email Can Not Been Hackable, Then You Are Wrong…

Ur Email-ID Can Be Hack… But Its Can Be Hack Only Fault by User.. Most Of The Peoples Think That Their Has A Software to Hack A Email- ID’s But Truth Is Their Is No Software Present For Hacking Ur Mail ID’s..
Email Hacking can be possible to many ways like:-
 
1. Social Engineering
2.Phishing Attacks
3. Cookie Hijacking
4. By Keyloggers
Social Engineering:
This Process is defined as Hack the human mind without any tools…
This has become one of the hottest topics today and it seems to work out most of the times. Social Engineering doesn’t deal with the network security issues, vulnerabilities, exploits, etc. It just deals with simple Psychological tricks that help to get the information we want. 
This really works!! But it requires a lot of patience.
We are all talking about network security and fixing the vulnerabilities in networks.
 But what happens if some internal person of a network accidentally gives out the passwords. After all we are all humans; we are also vulnerable and can be easily
 exploited and compromised than the computers.
Social Engineering attacks have become most common during the chat sessions. 
With the increase in use of Instant Messengers, any anonymous person may have a 
chat with another any where in the world. The most crucial part of this attack is to 
win the trust of the victim.
Phishing Attack:
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surroundering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.
Cookie Hijacking:
In cookie hijacking we can hack email accounts very easily.. This trick is very
 dangereous because whenever user change a password then there is no need to
 attacker for again hack Email- ID of victim. And it would take you to inbox of victim’s yahoo account without asking for any password of victim account.
Keyloggers:
Keylogger is a software program or hardware device that is used to monitor and log 
each of the keys a user types into a computer keyboard. The user who installed the program or hardware device can then view all keys typed in by that user. Because 
these programs and hardware devices monitor the keys typed in a user can easily 
find user passwords and other information a user may not wish others to know about.
Keyloggers, as a surveillance tool, are often used by employers to ensure employees
 use work computers for business purposes only. Unfortunately, keyloggers can also
 be embedded in spyware allowing your information to be transmitted to an unknown third party.
Phishing Attacks
Here we tells about PHISHING & How can we protect from it.~! 
>>WHAT IS PHISHING:-
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surroundering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information. 
>>MOBILE PHISHING:
Phishing scams are not limited to the internet. Some phishers use the telephone to make requests for information. If you get a call from your banking institution asking for personal information, hang up and call your bank directly. Your bank will have your social security number and account information on file and should only ask you to verify a few digits.
like Iphone,Apple ,iTunes n more…By SMS
EXAMPLE:- 
>>Congratulations! Your mobile phone has won US$ 10 Million prize money. To claim your money, call this number XXXXXXXX,give your permanent address,pin number,account number or credit card number…
The phisher can ask like it They want your personal Information.
 Some people do the reply to phisher then after he/she can be target of Phisher… so never be reply these type of Messages or Mail. 
In a phishing attack, the attacker creates a situation wherein people believe that they are dealing with an authorized party, like their bank or another service provider. The attacker will ask the victim for sensitive information such as credit card information. 
>>Phishing attacks generally target:
    * Bank information – e.g. VISA and PayPal accounts.
    * Username and password information.
    * Social Security numbers.
    * Information which can be used to retrieve forgotten or lost credentials.
                                                                                                          >>Follow the tips below to protect yourself against these threats:

· Your bank will never ask you to divulge account information or passwords via email. Never give out this information, especially via email.
· Don’t open emails that come from untrusted sources.
· Don’t run files that you receive via email without making sure of their origin.
· Don’t click links in emails. If they come from a known source, type them on the browser’s address bar. If they come from an untrusted source, simply ignore them, as they could take you to a web designed to download malware onto your computer.
· Keep your computer protected. Install a security solution and keep it up-to-date.

>>Protect yourself from Phishing scams that could lead to identity theft. I cannot stress this enough. Phishing scams are a hot topic lately that have grown with the popularity of online banking and social networking sites like MySpace, Facebook and Friendster.

The term Phishing comes from the analogy to “fishing”. The phisher uses a bait to lure victims into giving out personal information like passwords and credit card numbers. The bait is typically and urgent plea from one of the victims friends or trusted websites, asking for information to resolve some sort of problem with their account.  
>>Anti-phishing software is a must for anyone that accesses the internet. Most of the internet service providers have some safety measures included as part of their online security software. Most web browsers also have add-ons that can detect most phishing scams. Unfortunately, these measures are not enough. Some of the more clever phishers have found ways to trick the anti-phishing software so you need to be cautious of suspicious emails and messages.

No comments:

Post a Comment

 

FACEBOOK PAGE

SKETCHES & PAINTINGS