<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.element14.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>Keep an eye on your e-mail account. Harrowing tale...</title><link>https://community.element14.com/technologies/security/w/documents/9734/keep-an-eye-on-your-e-mail-account-harrowing-tale</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>Keep an eye on your e-mail account. Harrowing tale...</title><link>https://community.element14.com/technologies/security/w/documents/9734/keep-an-eye-on-your-e-mail-account-harrowing-tale</link><pubDate>Fri, 08 Oct 2021 04:50:49 GMT</pubDate><guid isPermaLink="false">93d5dcb4-84c2-446f-b2cb-99731719e767:4108c34a-bb71-47e7-875d-f196d9387c55</guid><dc:creator>DebuggerGuys</dc:creator><comments>https://community.element14.com/technologies/security/w/documents/9734/keep-an-eye-on-your-e-mail-account-harrowing-tale#comments</comments><description>Current Revision posted to Documents by DebuggerGuys on 10/8/2021 4:50:49 AM&lt;br /&gt;
&lt;p style="margin:0;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:-webkit-auto;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;&lt;em&gt;...&amp;quot;When [my wife] came back to her desk, half an hour later, she couldn’t log into Gmail at all. By that time, I was up and looking at e‑mail, and we both quickly saw what the real problem was. &lt;/em&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:-webkit-auto;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;&lt;em&gt;In my inbox I found a message purporting to be from her, followed by a quickly proliferating stream of concerned responses from friends and acquaintances, all about the fact that she had been “mugged in Madrid.” &lt;/em&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:-webkit-auto;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;&lt;em&gt;The account had seemed sluggish earlier that morning because my wife had tried to use it at just the moment a hacker was taking it over and changing its settings—including the password, so that she couldn’t log in again&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:-webkit-auto;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;&lt;em&gt;The greatest practical fear for my wife and me was that, even if she eventually managed to retrieve her records, so much of our personal and financial data would be in someone else’s presumably hostile hands that we would spend our remaining years looking over our shoulders, wondering how and when something would be put to damaging use. At some point over the past six years, &lt;strong&gt;our [email] correspondence would certainly have included every number or code that was important to us – credit card numbers, bank-account information, medical info, and any other sensitive data you can imagine.&amp;quot;...&lt;/strong&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:right;"&gt;&lt;span style="font-family:verdana, geneva;font-size:8pt;"&gt;&lt;em&gt;&lt;strong&gt;Jeff Atwood&lt;br /&gt;&lt;/strong&gt;&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;padding:0px;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:-webkit-auto;"&gt;&amp;nbsp;&lt;/p&gt;&lt;table border="1" cellpadding="3" cellspacing="0" class="jiveBorder" style="width:100%;border:1px solid #000000;"&gt;&lt;thead&gt;&lt;tr&gt;&lt;th align="center" rowspan="2" style="border:1px solid black;border:1px solid #000000;background-color:#6690bc;" valign="middle"&gt;&lt;br /&gt;&lt;a href="http://data.whicdn.com/images/12811085/securitykey_large.jpg"&gt;&lt;img alt="Securitykey_large" class="jiveImage" src="http://data.whicdn.com/images/12811085/securitykey_large.jpg" /&gt;&lt;/a&gt;&lt;/th&gt;&lt;th align="center" style="border:1px solid black;border:1px solid #000000;background-color:#6690bc;" valign="middle"&gt;&lt;span style="color:#ffffff;"&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td style="border:1px solid black;border:1px solid #000000;"&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;p style="margin:0;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:-webkit-auto;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;Your email is &lt;a class="jive-link-external-small" href="http://www.codinghorror.com/blog/2008/06/please-give-us-your-email-password.html" rel="nofollow ugc noopener" style="color:#a2427c;" target="_blank"&gt;the skeleton key to your online identity&lt;/a&gt;. When you lose control of your email to a hacker – not if, but &lt;em&gt;when&lt;/em&gt; you lose control of your email to a hacker – the situation is dire. Email is a one stop shop for online identity theft. You should start thinking of security for your email as roughly equivalent to the sort of security you&amp;#39;d want on your bank account. It&amp;#39;s exceedingly close to that in practice.&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:-webkit-auto;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="margin:0;font-family:calibri, tahoma, arial, sans-serif;font-size:16px;text-align:-webkit-auto;"&gt;&lt;span style="font-family:verdana, geneva;"&gt;&lt;span style="font-size:18pt;"&gt;The good news&lt;/span&gt;, at least if you use GMail, is that &lt;strong&gt;you can make your email virtually hacker-proof today, provided you own a cell phone&lt;/strong&gt;. The fancy geek technical term for this is &lt;a class="jive-link-external-small" href="http://www.codinghorror.com/blog/2007/02/what-you-have-what-you-know-what-you-are.html" rel="nofollow ugc noopener" style="color:#a2427c;" target="_blank"&gt;two factor authentication&lt;/a&gt;, but that doesn&amp;#39;t matter right now. What matters is that until you turn this on, your email is vulnerable. So let&amp;#39;s get started. Not tomorrow. Not next week. &lt;a class="jive-link-external-small" href="http://www.codinghorror.com/blog/2007/07/yes-but-what-have-you-done.html" rel="nofollow ugc noopener" style="color:#a2427c;" target="_blank"&gt;&lt;em&gt;Right. Freaking. Now.&lt;/em&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;&lt;p style="margin:0;padding:0px;"&gt;&amp;nbsp;&lt;/p&gt;&lt;div style="text-align:-webkit-auto;"&gt;&lt;span style="font-family:verdana, geneva;font-size:12pt;"&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style="margin:0;"&gt;SOURCE: &lt;span style="font-size:12pt;"&gt;&lt;strong&gt;&lt;a class="jive-link-external-small" href="http://www.codinghorror.com/blog/" rel="nofollow ugc noopener" target="_blank"&gt;Coding Horror.&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: account, hacker-proof, hackers, online, identity, e-mail&lt;/div&gt;
</description></item></channel></rss>