How to determine whether your network mailbox account has been hijacked

Source: Internet
Author: User
Tags email account

Malicious attackers like to use their online mail accounts as attack targets, as well as legal enforcement investigators and internally responsible persons who have damaged their accounts. The security of network mail is crucial. It is even important to your online bank account. If your network mailbox is hijacked, all the network accounts related to it (the systems that send email notifications when the password is forgotten) may be leaked, including your bank information. Common attacks include phishing, brute force password cracking, cross-site scripting, and attacks that exploit authentication system vulnerabilities. For the vast majority of attacks, common users cannot discover or process them. The problem is, unless your password is changed without your knowledge, how do you know your account has been stolen? Fortunately, we have a very simple method here.

When someone steals an online email account, they will filter out all your emails and leave only the information they are interested in. Unless intruders are really stupid, although sometimes they are really stupid, they usually restore all emails to the unread status (BOLD), so you won't find them. You can set a silent virtual alarm in your account. The method is as follows:

1) Upload a small image to a place where you can view access records. Many websites now provide network space, such as your DSL service provider or friends with shared space. Do not publish the image URL after the upload is complete. It is best to hide it so that no one will accidentally find the link.

2) send an email to your online mailbox, attach the image to it, and add an attractive subject, such as "new bank password" and "reply: employee personal information "or" succeeded. We passed!" And so on. You can use any theme that intruders will not look. Put this email in the inbox To Keep It unread. In this way, your silent alarm settings are ready.

3) Of course, we still hope that your account will never be hijacked. However, once intruders intrude into your mailbox and read your alarm email, they will access the URL embedded in the image. You can regularly check the image access logs. If there are traces of access, your account may be hijacked. The network server log contains the IP address of the intruder and the time when they intrude into your mailbox and read the email.

This method is simple. You can also use the message system to protect your MySpace account in the same way. If you are interested, try it.


========================================================== =====

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.