DATA DOCTORS

If hackers can access public figures’ email accounts, how can I stay safe?

Nov 5, 2016, 7:20 AM

(StockSnap Photo)...

(StockSnap Photo)

(StockSnap Photo)

Q: What protective measures can be taken to avoid having email hacked like what happened in the Podesta case?

There are many lessons that can be learned from the recent high-profile email hacks of several public figures.

The most important lesson is that people, not security measures, are the easiest to compromise.

The weakest link

As anyone in IT security will tell you, no matter how sophisticated the cybersecurity system may be, the humans using the system are always the weakest link.

In most cases, hackers employ what’s called social engineering to trick users into divulging critical information that allows them to be exploited. In the Podesta case, a “spear-phishing” email claiming the password had been stolen convinced both the users and the IT person that it was a legitimate warning from Google.

Spear-phishing refers to a more targeted exploit because the hackers know that you use a specific online service.

In this case, since the recipient’s email address ended with @gmail.com, they created a stolen password alert that appeared to be from Google.

Tell-tale signs

As with most phishing messages, a close examination of the punctuation and grammar would have tipped off an observant reader. The lack of commas in appropriate places, the relative vagueness of the message and the fact that they ended the message with “Best, The Mail Team” are clear red flags.

The reason social engineering tricks work so well is that the anxiety created by the message causes most people to focus on the salacious subject line and scary claims instead of the message in its entirety.

Another way to sniff out suspicious messages is to use the hover method as described in this video.

Thoroughly read messages

The IT person fell for the fake message as well but, in their defense, they replied with a specific link to change the password, which the frantic user didn’t use.

Instead, they went back to the original message and clicked on the button that said “Change Password,” which sent them right where the hackers wanted them.

Had they followed the instructions from the IT person, even though the message was a fake, they would not have been compromised.

Stolen password protection

Another important step that the IT person suggested in his response was to make sure that two-step verification was turned on, which would have kept the hackers out even with the password.

Two-step verification creates a second layer of protection in the event someone steals your password. With it turned on, whenever the site detects a valid login from an unknown location or device, it sends a special code via text message to your smartphone.

Without the code, the person that has your password won’t be able to get in AND you will have been alerted that your password has been compromised.

Never click links

We’ve all heard “never click links in email messages” a million times, but cleverly-crafted messages can scare people into taking immediate action.

Even when you think a warning is legitimate, avoid the links and manually type in the address of the service in question to see if the same warning comes up when you log in.

Data Doctors

Many of the fake videos you’ll encounter are likely to be viewed on your smartphone, which can ma...

Data Doctors

Here are all the tips we know regarding how to spot deep fake videos

Many of the fake videos you’ll encounter are likely to be viewed on your smartphone, which can make detection a bit more difficult.

3 days ago

Patrick Mahomes #15 and head coach Andy Reid of the Kansas City Chiefs are recorded on a phone as t...

Data Doctors

Handy tech tips all Valley residents should use to find lost phones in a snap

Q: My phone went missing, and I haven’t been able to locate it using the Find My service, so what should I do next?

10 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are tips for freeing up Google storage space

Google provides a generous amount of free online storage but it can fill up quickly depending on how many of its resources you use.

17 days ago

Discover how to assess, estimate, and shop for the right battery pack with this concise guide. (Pex...

Data Doctors

Here is everything you need to know for testing and buying battery banks

Discover how to assess, estimate and shop for the right battery pack with this concise guide.

24 days ago

(Pexels Photo)...

Ken Colburn, Data Doctors

Here are the truly free smartphone video editing apps

The processing power on our smartphones has grown exponentially, allowing anyone to perform sophisticated video editing easily.

1 month ago

Google Maps app....

Data Doctors

How to rediscover places visited years ago on Google maps

Whether you're an Android or iOS user, or prefer accessing Google Maps on your computer, you'll find step-by-step instructions to unlock your travel memories effortlessly.

1 month ago

Sponsored Articles

...

DESERT INSTITUTE FOR SPINE CARE

Desert Institute for Spine Care is the place for weekend warriors to fix their back pain

Spring has sprung and nothing is better than March in Arizona. The temperatures are perfect and with the beautiful weather, Arizona has become a hotbed for hikers, runners, golfers, pickleball players and all types of weekend warriors.

...

DISC Desert Institute for Spine Care

Sciatica pain is treatable but surgery may be required

Sciatica pain is one of the most common ailments a person can face, and if not taken seriously, it could become one of the most harmful.

...

Collins Comfort Masters

Avoid a potential emergency and get your home’s heating and furnace safety checked

With the weather getting colder throughout the Valley, the best time to make sure your heating is all up to date is now. 

If hackers can access public figures’ email accounts, how can I stay safe?