{"id":53,"date":"2009-02-19T18:32:00","date_gmt":"2009-02-19T18:32:00","guid":{"rendered":"http:\/\/mayanktrivedi.net\/technotes\/2009\/02\/19\/email-hacking-how-to-avoid\/"},"modified":"2022-04-06T20:23:49","modified_gmt":"2022-04-06T20:23:49","slug":"email-hacking-how-to-avoid","status":"publish","type":"post","link":"http:\/\/mayanktrivedi.net\/technotes\/2009\/02\/19\/email-hacking-how-to-avoid\/","title":{"rendered":"Email Hacking &#8211; How to avoid"},"content":{"rendered":"<div>We often get to hear that Email accounts are hacked and someone else has logged in email addresses and sent out mails to the address list.\u00a0<\/div>\n<div><\/div>\n<div>No this certainly is a case where one gets worried about the misuse of email account. \u00a0But then who is responsible? \u00a0Certainly we ourselves as we either do not change our passwords or we keep them so simple that anyone having knowledge what we call Personally Identifiable Information (like\u00a0our \/ family member birthday, our location zip\/pin or similar information) can recover or reset our password. \u00a0<\/div>\n<div><\/div>\n<div>Yes it indeed is alarming as\u00a0email account hacking, specifically if it is from a web based email service provider, does not require any special tool or any special skill. \u00a0All you have to know is the answers to few questions that thesee web mail services post when trying to retrieve passwords or may be change them. \u00a0<\/div>\n<div><\/div>\n<div>IT pretty easy to do this when you know the subject (person whose account you are hacking).<\/div>\n<div><\/div>\n<div>Hence it is quite important that along with password you change your secret question and answer at a regular interval and keep it to yourself. \u00a0Also, small tweaking may be done in the ZIP \/ PIN change (where applicable) as that also plays an important role in password recovery or changing.<\/div>\n","protected":false},"excerpt":{"rendered":"<p>We often get to hear that Email accounts are hacked and someone else has logged in email addresses and sent out mails to the address list.\u00a0 No this certainly is a case where one gets worried about the misuse of email account. \u00a0But then who is responsible? \u00a0Certainly we ourselves as we either do not &hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[68,67],"tags":[],"class_list":["post-53","post","type-post","status-publish","format-standard","hentry","category-email-hacking","category-securing-email-passwords","entry entry-center"],"_links":{"self":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/53","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/comments?post=53"}],"version-history":[{"count":1,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/53\/revisions"}],"predecessor-version":[{"id":194,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/posts\/53\/revisions\/194"}],"wp:attachment":[{"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/media?parent=53"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/categories?post=53"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/mayanktrivedi.net\/technotes\/wp-json\/wp\/v2\/tags?post=53"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}