<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Email Hacking Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/tag/email-hacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/tag/email-hacking/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Sun, 23 Jul 2023 01:59:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Email Hacking Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/tag/email-hacking/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What to Do if Someone Hacks Your Email Account</title>
		<link>https://fosterinstitute.com/what-to-do-if-someone-hacks-your-email-account/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 21 Jul 2023 16:10:06 +0000</pubDate>
				<category><![CDATA[Email]]></category>
		<category><![CDATA[Hacked Email]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Email Hacking]]></category>
		<category><![CDATA[Email Password]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[Security Patches]]></category>
		<category><![CDATA[two-step authentication]]></category>
		<category><![CDATA[Unauthorized Spammer]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2914</guid>

					<description><![CDATA[<p>How to protect yourself if, or even before, an unauthorized spammer uses one of your email accounts to send out spam: If you have cybersecurity insurance or feel this incident could cause significant damage, consider having a forensic analysis to track down what happened. Contact your email provider, explain what happened, and ask for help. [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/what-to-do-if-someone-hacks-your-email-account/">What to Do if Someone Hacks Your Email Account</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>How to protect yourself if, or even before, an unauthorized spammer uses one of your email accounts to send out spam:<span id="more-2914"></span></p>
<p>If you have cybersecurity insurance or feel this incident could cause significant damage, consider having a forensic analysis to track down what happened.</p>
<p>Contact your email provider, explain what happened, and ask for help. Continue down this list while you wait for their response.</p>
<p>Reset your email account password immediately. If you can&#8217;t log in because someone unauthorized reset your password, try resetting it yourself. If that doesn&#8217;t work, contact your email company&#8217;s tech support.</p>
<p>Check if your username and old passwords have appeared on the dark web. Visit <a href="https://haveibeenpwned.com/" target="_blank" rel="noopener">https://haveibeenpwned.com/</a> and similar sites to find out. Never enter your password.</p>
<p>Change passwords for all your accounts including social media, banking, and other sensitive accounts, especially if you&#8217;ve used the same password for multiple accounts. Someone may have access to more than just your email.</p>
<p>Consider using a password manager like 1Password, Dashlane, LastPass, NordPass or another to help ease the pain of having different passwords on every website from now on.</p>
<p>When setting up security questions, avoid real answers that are easy for a bad actor to research. When asked, &#8220;Where were you born,&#8221; you could answer something like, &#8220;The fourth crater on the moon.&#8221; Save your secret answers in a file in a random place with a random name like &#8220;socks.docx&#8221; for when you need the answers. You can encrypt the file for added safety.</p>
<p>Enable two-step verification for your email account. While you are at it, set up two-step verification everywhere you can, primarily on sensitive websites and services. Here is how to add MFA to your LinkedIn account for added security <a href="https://www.linkedin.com/help/linkedin/answer/544/turning-two-step-verification-on-and-off?lang=en" target="_blank" rel="noopener">https://www.linkedin.com/help/linkedin/answer/544/turning-two-step-verification-on-and-off?lang=en</a></p>
<p>If you set up two step authentication so that the site or service sends you an email message for the second part of logging in, and the hacker has access your email, it defeats the purpose of MFA. Therefore, if you set up the two-step login with email as the second step, use a different secure email address.</p>
<p>Review your email&#8217;s &#8220;sent&#8221; folder to spot any unrecognized messages.</p>
<p>Look at all your email accounts in your organization to ensure there are no email forwarding or filtering rules you did not configure.</p>
<p>Check your websites, especially LinkedIn, for any unauthorized changes.</p>
<p>Set up SPF and DKIM. More information here: <a href="https://fosterinstitute.com/block-inbound-and-outbound-fraudulent-email-messages/" target="_blank" rel="noopener">https://fosterinstitute.com/block-inbound-and-outbound-fraudulent-email-messages/</a></p>
<p>Watch out for remote control applications that might allow a bad actor to compromise your computer and send email messages as you.</p>
<p>Be aware that your computer or another computer in your organization might be hacked, enabling attackers to send messages on your behalf. Stay vigilant and take measures to protect against such incidents.</p>
<p>Regularly apply critical security patches to your computer. You can check for updates manually, even if automatic updates are enabled.</p>
<p>Ensure your anti-virus program is current and run a manual scan regularly. Using EDR or XDR services add more security.</p>
<p>If you use a browser to send and receive email, this is a drastic step, but consider uninstalling the browser. When you reinstall the browser, add only the plugins you need.</p>
<p>If you use your phone or tablet for email, they could be hacked. Apply security patches, keep them in your possession, examine the privacy settings, and lock devices when not in use.</p>
<p>Watch out for apps on your computer, tablet, or phone that may be harvesting your address book without your knowledge. A drastic move would be to factory reset and erase them, but be sure your important data is stored in the cloud or backed up.</p>
<p>Notify financial institutions that if they receive messages from you, the messages could be fraudulent.</p>
<p>You might want to set up a new email address to use until you feel confident your old address is safe.</p>
<p>If you haven&#8217;t already, freeze your credit.</p>
<p>Monitor your financial accounts.</p>
<p>Before you send out notifications, you will want to talk to an advisor who can help you know what to say.</p>
<p>Please forward this to your friends so that, if someone appears to hack their email account, they will know what to do to.</p>
<p>Subscribe to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>The post <a href="https://fosterinstitute.com/what-to-do-if-someone-hacks-your-email-account/">What to Do if Someone Hacks Your Email Account</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>You Do Not Need to Understand Computers to Make Ransomware</title>
		<link>https://fosterinstitute.com/you-do-not-need-to-understand-computers-to-make-ransomware/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 23 Apr 2019 17:00:45 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Inpivx]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Cyber Attacks]]></category>
		<category><![CDATA[Cyber Security Awareness]]></category>
		<category><![CDATA[Cyber Threats]]></category>
		<category><![CDATA[Email Hacking]]></category>
		<category><![CDATA[Email Password]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[patch updates]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=2944</guid>

					<description><![CDATA[<p>There is a new program that is designed to help even non-technical people to create ransomware. The tool is called Inpivx, and it is designed to provide easy point-and-click functionality. Do you know someone who doesn&#8217;t like your organization and would like to cause harm? Can you think of anyone who may want to exploit [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/you-do-not-need-to-understand-computers-to-make-ransomware/">You Do Not Need to Understand Computers to Make Ransomware</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>There is a new program that is designed to help even non-technical people to create ransomware. The tool is called Inpivx, and it is designed to provide easy point-and-click functionality. <span id="more-2944"></span></p>
<p>Do you know someone who doesn&#8217;t like your organization and would like to cause harm? Can you think of anyone who may want to exploit you for money, other than a vast population of bad actors already in the world?</p>
<p>Even more worrisome than Inpivx is the realization that there will be more user-friendly tools to come from sources around the globe. Some attacks are already relatively easy to launch for a non-technical person, and such technologies are in an upward trend.</p>
<p>Remember typewriters? To move a paragraph, you had to re-type the page. Over time, typing documents became incredibly easy even for non-technical people. Creating ransomware is on the same path to easiness.<br />
Anti-virus, firewalls, and passwords are crucial to cybersecurity. All of them are. However, if you feel that those are enough, you might be shocked if you get hacked.</p>
<p>How do you protect yourself? Keep patches up to date, remove all non-essential programs from computers, grant users only bare minimum privileges they need to do their jobs, use excellent spam protection, never allow users to check webmail at your organization, to name just a few. And, of course, keep those security IT Vital Systems Reviews current.</p>
<p>Please forward this to your friends, so they know that ransomware programs are more accessible to create than ever, even for non-technical people, so the danger is growing too.</p>
<p>The post <a href="https://fosterinstitute.com/you-do-not-need-to-understand-computers-to-make-ransomware/">You Do Not Need to Understand Computers to Make Ransomware</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
