User Side Solutions:
1. Log in the Email account what ever you use only by typing the appropriate website in the address bar or from your bookmarks.
Eg. www.gmail.com or http://mail.google.com/mail, www.hotmail.com, www.mail.yahoo.com,etc.
You may see the log in forms in many other websites. When you are logging in that fake forms, the information will be stored so that your entire email account will be in the fakers' hand.
2. Do not respond to any emails that ask for your password.
3. Do not click on the links from untrusted emails.
Server Side Solutions:
Preventing the email account from malwares and automated programs.
1. Two password method may be used to log in.
2. One password and a word verification may be done while logging in.
3. Previous log in sessions & their IP addresses may be shown so that the user is aware of any hacking took place.
4. Wrong passwords may be accounted and sent through email to secondary email account of the user.
1. Log in the Email account what ever you use only by typing the appropriate website in the address bar or from your bookmarks.
Eg. www.gmail.com or http://mail.google.com/mail, www.hotmail.com, www.mail.yahoo.com,etc.
You may see the log in forms in many other websites. When you are logging in that fake forms, the information will be stored so that your entire email account will be in the fakers' hand.
2. Do not respond to any emails that ask for your password.
3. Do not click on the links from untrusted emails.
Server Side Solutions:
Preventing the email account from malwares and automated programs.
1. Two password method may be used to log in.
2. One password and a word verification may be done while logging in.
3. Previous log in sessions & their IP addresses may be shown so that the user is aware of any hacking took place.
4. Wrong passwords may be accounted and sent through email to secondary email account of the user.
Comments
Post a Comment