Gadget Gestures

Lets Gesture about Gadgets

Wednesday, March 3, 2021
Log in
  • News
  • Tablets
  • SmartPhones
  • Laptops
  • Cameras
  • Games
  • Apps/Softwares
  • iPad/iPhone
  • Latest News
    • Lenovo A10000, A30000 and A60000
    • TV Has Never Been this Smart – the New Motto of Samsung Smart TVs
    • Nokia Lumia 1020 on Sale at AT&T
    • How Can a Sniffer Help in Detecting Lost or Stolen Mobile Phones?
    • Amazon expected to launch FireTube TV box before Christmas
    • Nokia Lumia 521 Release Date,Features, Specs, Price- Will be Available through T- Mobile
    • New Mercedes-Maybach S600, Priced At 200,000 dollars
    • Intel unveils Jarvis, Edison and dual-OS processors
    • Blackberry Z10 Problems of over heating, Rebooting: Even New BB 10 OS is not Helping
    • Samsung Galaxy Note 2 Vs Samsung Galaxy Note 3 – Compare Possible Price, Design, Display, Features
    • Evernote Integration of New Google Drive Button
    • White Nexus 4 Release Date Subdue Possibilities of Verizon Nexus 4 LTE

Millions of Gmail Accounts Compromised via Phishing Techniques

November 13, 2017 By David Crozier Leave a Comment

Email, RSS Follow

Google search engine

A Google team found that Gmail accounts are more likely to be hijacked if hackers are using phishing methods than using malicious software such as keyloggers. In other words, Google accounts get stolen mainly due to user-side errors, rather than hacking.

For their study, Google experts joined forces with a team from the University of California Berkeley. The two teams planned to learn how Gmail users manage to end up with a compromised account.

The Google team published their findings, which they deemed “immediately useful,” in a blog post. The research revealed that hackers usually employ two tools to take over Gmail accounts: malicious software and phishing techniques.

Around 788,000 account details were stolen with help from keyloggers in a year, while phishing methods accounted for 12 million exposed credentials. In total, around 3.3 billion accounts were compromised through third-party data breaches, researchers found.

Experts claim that hackers are constantly fine-tuning their blackhat tools to make them more effective. For instance, many hackers are now using IP addresses, phone numbers, geolocation, and even device model information to break into the accounts.

Users Usually at Fault

Google researchers said they sifted through the data available on the black market and as many as 25,000 hacking tools in their research. All computer models revealed that the issue when it comes to a compromised account mainly lies with the user.

The user is usually at fault, researchers noted, because account owners use either weak passwords or ignore warnings about a cyber attack and continue to use their old passwords. Since human errors are difficult to prevent, experts believe existing protections should be upgraded in order to keep users safe and stay ahead of hackers.

The latest findings echo a report about a phishing scam affecting Google Docs users earlier this year. In May, users reported receiving fake Google Docs invite emails from their friends, which redirected them to a genuine Google website but also allowed hackers take over their accounts via malicious software. At the time, users were recommended that they contact their friends to ensure that it was them who had sent them the invite, not hackers.
Image Source: Pixabay

Email, RSS Follow

Filed Under: Google

As a participant in the Amazon Services LLC Associates Program, this site may earn from qualifying purchases. We may also earn commissions on purchases from other retail websites.

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 5 other subscribers

Recent Articles

GitHub stickers displaying a cat-octopus with a human face

Microsoft Acquires GitHub for $7.5 Billion’s Worth of Shares

June 5, 2018 By Mary Duncan Leave a Comment

Teenage girl browsing her smartphone while sitting at the table

Facebook Is No Longer the Top Social Media Platform Among Teenagers

June 4, 2018 By Lori David Leave a Comment

Fake news headline on a laptop screen

Facebook Is Taking Its Fight Against Misinformation to a Whole New Level

May 25, 2018 By Brandi McCants Leave a Comment

Unsolved Rubik cube on a black background

An Australian Professional Speedcuber Broke His Own Record at Solving a Rubik Cube

May 6, 2018 By Lori David Leave a Comment

Cambridge Analytica logo on a computer screen

Soon After the Facebook Scandal, Cambridge Analytica Is Going Bankrupt

May 3, 2018 By David Crozier Leave a Comment

Windows restore disk placed in a paper envelope for CDs

Renowned E-Waste Recycler Goes to Jail for Distributing Free Windows Restore Disks

April 25, 2018 By Micheal Baptiste Leave a Comment

nasa globe and emblem outside a building

NASA Announces its Investments in Future Tech Concepts Such as Biobots and Shapeshifters

April 3, 2018 By Brandi McCants Leave a Comment

YouTube app opened in browser with the logo on top of it

YouTube Increases the Number of Ads to Trick Users into Subscribing to Its Paid Streaming Platform

March 22, 2018 By Mary Duncan Leave a Comment

Facebook dislike button

Facebook Stock Falling for Second Straight Day amid Data Scandal

March 21, 2018 By Paul Leave a Comment

Permanently Delete Facebook

WhatsApp Founder to Facebook Users: ‘Delete Facebook’

March 21, 2018 By Paul Leave a Comment

Uber driverless car

Uber Driverless Car Kills Woman in Arizona

March 20, 2018 By Paul Leave a Comment

Windows 10 Update reaches 35%

Microsoft: Windows 10 Updates To Take No Longer than 30 Min

March 20, 2018 By David Crozier Leave a Comment

The Apple Watch

Apple Watch User Awakened by 3 Cops In His Bedroom after Accidental Call

March 19, 2018 By David Crozier Leave a Comment

Pokemon Go Character

Pokemon Go Player Attacks Other Player IRL for Losing Gym

March 19, 2018 By David Crozier Leave a Comment

Pages

  • About Us
  • Contact Us
  • Privacy Policy GDPR
  • Team

Recent Posts

  • Samsung Tablet 10.1 Review: Perfect for Your Entertainment Needs October 29, 2020
  • Take Better Pictures Today With These 9 Helpful IPhone Camera Settings November 4, 2019
  • The 6 Best Gaming Desks to Give You a Great View October 31, 2019
  • How Much RAM Do I Need for Gaming? Here’s the Sweet Spot for Optimal Performance October 21, 2019
  • Lenovo Ideapad Yoga 11s Review: A Teaser October 16, 2019
  • Basic Computer Skills – 6 Tips You Need to Know! September 30, 2019
  • Why is my Laptop Fan so Loud? Six Possible Reasons for the Noisy Nuisance September 9, 2019

Related Articles

  • Google Home device placed on a table

    Google Makes Smart Assistant Requests More Natural with Continued Conversation

    Jun 22, 2018
  • Colorful 3D forms of different geometrical shapes

    The Generative Query Network Constructs 3D Images by Using Few Information (Study)

    Jun 15, 2018
  • Google Translate panel with the logo of the app and a globe drawing

    Google Adopts an Offline Translation AI to Serve You Anywhere

    Jun 13, 2018
  • Man inserting a username and a password on a laptop

    Google Wants to Kill Passwords with the Chrome 67 Update

    May 31, 2018
  • YouTube Red logo on a red background

    Google Gives Up on YouTube Red in Favor of Something Better

    May 20, 2018
  • HTTPS domain typed in an address bar

    Google Abandons the Label that Signaled Secure HTTPS Websites

    May 18, 2018
  • Google Plus logo on a white background

    Google Disables the Most Recent Update to Regain the Audio of Web Games

    May 16, 2018
  • Person holding a Google Maps pinpoint

    Google Has Prepared a Series of Surprises Hidden in the Upcoming Google Maps Update

    May 8, 2018
  • Spam attention signs of different sizes

    Weird Gmail Spam Took Over Inboxes by Showing People Messages Apparently Sent by Themselves

    Apr 23, 2018
  • Selecting one silhouette in favor of two others

    Google Launches the Candidate Discovery Feature to Help with Recruiting

    Mar 29, 2018

Copyright © 2021 GadgetGestures.com

About · Privacy Policy · Terms of Use · Contact

This website uses cookies to ensure you get the best experience on our website. Learn more.