:: Free article content
Authors: Maximum article exposure. Publishers: Reprintable article content.
Featured Articles
Recently Added Articles
Most Viewed Articles
Article Comments
Advanced Article Search
Submit Article
Check Article Status
Author TOS
RSS Article Feeds
Terms of Service

How to prevent e-mail attacks
Home Computers & Technology Email
By: Alisa Bagrii Email Article
Word Count: 852 Digg it | it | Google it | StumbleUpon it


One of the most common methods of hacking the e-mail has been and remains phishing. And unfortunately attempts to gain access to personal data are not decreasing.

Phishing is a type of computer fraud, which uses social engineering principles to obtain confidential information from the victim. Scammers get in touch with the person and make him share his personal information. The ways how they are doing are changing permanently.

One of the popular scammers' techniques is sending a potential victim messages on behalf of a well-known organization or entity. They c an be sent both by email or by other means: social networking, forums, mobile messages.

Such message usually contains a link (a fake page) that contains malicious software.

Why scammers attempt to hack personal e-mails

Attackers seek to steal personal data and get into the user's e-mail in order to find the card/bank account, business information, as well as to get information for political scandals. Through e-mails a user usually recovers a password to the account in case if its loss or if someone has already managed to steal his account. Accordingly, an attacker who gains access to the mail, can collect a lot of information about the services you use. Therefore, in some cases, breaking the mailbox may actually mean breaking your entire digital life.

How to protect yourself

IT-specialists are convinced that most mail phishing attempts happen by stealing or guessing passwords. Below we have collected tips in order to help you to protect your account.

  1. Different passwords for each major service

  2. Use different passwords for each account. If you have the same password since you registered on a website - there are more chances that it may already be in the list of stolen passwords. And the more accounts of yours have same password, the more data you can lose if this password is stolen. Creating a separate secure password for every account helps to protect you and your digital data.

  3. A long complicated password

  4. «Password», «qwerty» and 123456 are examples of terrible passwords, because everyone knows them, including potential criminals. The longer the password, the harder it is to guess it for scammers and intruders. Do not use any popular phrases or text to build your password: research shows that people tend to use the same phrases, and you will definitely want a password known only to you. You can come up with a phrase known only to you, and link to a specific site in order to remember it in a better way. For example, for your e-mail take some phrase, like "My friend Mark every day sends me one funny letter", and then play with it using numbers, symbols, and the first letters of each word - for example, "MfMedsm1fl".

  5. Change passwords regularly.

  6. Services periodically break, your passwords are periodically become lost, and with this, personally, you can not do anything. If you want to register on a dating site, or in some dubious service, it is better to create a second (or even third or fourth) mailbox;

  7. Keep passwords in a safe place
  8. Page 1 of 2 :: First | Last :: Prev | 1 2 | Next

Alisa Bagrii is a content writer and journalist of Everycloud e-mail protection service. Filter your e-mail from spam and unsolicited malware with Spam Filter

Article Source:

This article has been viewed 1553 times.

Rate Article
Rating: 0 / 5 stars - 0 vote(s).

Article Comments
There are no comments for this article.

Leave A Reply
 Your Name
 Your Email Address [will not be published]
 Your Website [optional]
 What is four + six? [tell us you're human]
Notify me of followup comments via email

Related Articles

Copyright © 2019 by All rights reserved.

Terms of Service | Privacy Policy | Contact Us | Submit Article | Editorial