Protecting E-mail From Phishing Attacks

Written By Unknown on Saturday, February 6, 2010 | 9:30 PM


Do you use e-mail service for free such as Yahoo!, Hotmail, or Gmail? If yes, hackers have possibility to read your e-mail address first. In a large-scale action, the hackers have stolen more than 30 thousand accounts from various e-mail service, then spread the login data.

These hackers obtain by using special phishing attacks. They sent an e-mail to any person, who warn the user that there is an error in his mailbox. For that, they must verify your account through the site very similar to e-mail service originally. When users enter data, log data will be sent to the hackers.


During this, fake sites can be identified from the error in the encryption system and a fake certificate. Remarkably, both these features can now be manipulated by hackers. By inserting a null character into the Common Name on the certificate. Browsers are vulnerable only to read the character string until the null character, although the certificate was assigned to another domain.

That is, the browser believes that the certificates were valid, for example to www.hotmail.com. This security hole was known weeks ago on various browsers. So far, only Firefox and Opera are not fooled by this trick and warn users that data will be sent to the Hotmail servers are allegedly false. Do not want to miss, this time Microsoft is preparing a patch for its Internet Explorer.

Fatal if a hacker managed to access the e-mail account and read the e-mail available. They can find out where users have shopped online. Access to this online store was sent to an account that has been hacked, and then used to shop on behalf of the victim.

What Should We Do?

1. To ascertain whether the e-mail mailboxes become targets of hackers, we can check on http://serversniff.net site. This service has more than 40 thousand records the data.
2. In order to avoid this attack, always use a secure password and use Firefox or Opera for browsing.
3. Delete e-mails that we do not know the source without opening it.
4. Do not make an easy question as a security question in the e-mail service. The trick, give the answer in reverse order and use special characters.

0 comments:

Post a Comment