{"id":1821,"date":"2008-10-21T22:00:33","date_gmt":"2008-10-21T22:00:33","guid":{"rendered":"https:\/\/www.amitbhawani.com\/blog\/?p=1821"},"modified":"2008-10-21T18:04:07","modified_gmt":"2008-10-21T18:04:07","slug":"secure-email-hacking-prevention","status":"publish","type":"post","link":"https:\/\/www.amitbhawani.com\/blog\/secure-email-hacking-prevention\/","title":{"rendered":"How to Prevent your Email from Being Hacked"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright\" src=\"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/Images\/H\/hacked-email.JPG?resize=121%2C113\" alt=\"Email Hacked Prevention Steps\" width=\"121\" height=\"113\" \/>While the Internet may have been considered as one of the best things that had happened to society in the recent century, it has also opened the way for more and more fraudulent actions to be carried out easily.  Hacking is one such action.  Because the Internet is used by people from all parts of the world, it is extremely difficult for various government agencies to monitor the various activities conducted over the Internet.<\/p>\n<p>Perhaps the most targeted of Internet hackers is your email for the primary reason that once you sign up for an account with a particular service or purchase a particular product over the Internet, the first thing that is often done is to send you a confirmation email containing your username and password for that particular account that you have created. While many people would often print out the information and delete this email, some would rather store these in their email for convenience in the event that they forget their username and\/or password. Once a hacker is able to enter your email address, he or she would be able to view your personal information and would be able to access these accounts which would be able to provide them with more information regarding you. This would allow them to do transactions in your account with your profile resulting to various fraudulent activities.<\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/Images\/E\/Email-Password-Protection.jpg\" alt=\"Email password Protection\" \/><\/p>\n<p>It is for this reason that extreme caution must be done in order to protect your email from being hacked in order to protect yourself from possible fraudulent activities. Here are some ways you would be able to do this:<\/p>\n<p><strong><a href=\"https:\/\/www.amitbhawani.com\/blog\/check-password-strength-online-tools\/\">Creative passwords<\/a> and password retrieval questions :<\/strong><br \/>\nApart from not using personal information as your password or answers to retrieve your password, make sure that you use a password that combines letters, numbers and symbols.  It is also a good idea to incorporate capital and small letters instead of merely using all caps or all small letters.  This increases the number of combinations that a hacker would need to decipher, lowering his or her chances to access your account.  With regards to your password retrieval, do not use actual information.  Instead, provide information that you would be able to remember yet something that is unrelated to you since the first few tries of a hacker will be to use accurate and actual information regarding you to retrieve your password.<\/p>\n<p><strong>Do not leave important emails in your mailbox :<\/strong><br \/>\nThe moment you receive a confirmation letter from a website where you have signed up, print out the information or write it down on a notepad and delete the email immediately.  This would ensure that no personal information would be derived directly from your email whether by a hacker or a close friend.<\/p>\n<p><strong>Change password regularly :<\/strong><br \/>\nMake sure that you change your passwords and answers to retrieve your password information on a regular basis.  This is to ensure that by the time that a hacker has been able to decipher your old password you are now using a different password which would then cause them to go back to square one.  This is particularly important if you have allowed someone to access your email or other account with your permission to prevent the possibility of them accessing your accounts without your consent in the future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While the Internet may have been considered as one of the best things that had happened to society in the recent century, it has also opened the way for more and more fraudulent actions to be carried out easily. Hacking is one such action. Because the Internet is used by people from all parts of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":18645,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1299],"tags":[],"class_list":{"0":"post-1821","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"entry"},"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/12\/hacked-email.jpg?fit=228%2C180&ssl=1","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":1910,"url":"https:\/\/www.amitbhawani.com\/blog\/avoid-password-hacking\/","url_meta":{"origin":1821,"position":0},"title":"How to Avoid Password Hacking","author":"Amit Bhawani","date":"October 29, 2008","format":false,"excerpt":"Whenever you set up an account in an Internet site, you are often required to create a username and provide a password. In other cases, a computer generated password is created for you by the Internet website which is sent to your confirmation email address. Once you confirm your email,\u2026","rel":"","context":"In &quot;Security Blog&quot;","block_context":{"text":"Security Blog","link":"https:\/\/www.amitbhawani.com\/blog\/category\/security\/"},"img":{"alt_text":"Hacking Complex Passwords","src":"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/Images\/H\/Hacking-Complex-Passwords.JPG?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":10881,"url":"https:\/\/www.amitbhawani.com\/blog\/how-to-hack-using-google\/","url_meta":{"origin":1821,"position":1},"title":"How to HACK using Google?","author":"Tony Stark","date":"May 9, 2010","format":false,"excerpt":"It is not a new thing to know for computer savvy people that hacking is widespread now days. There are two types of people i.e. one who know about hacking and use their knowledge for bad and those who use their knowledge of hacking for anti hacking purposes. In this\u2026","rel":"","context":"In &quot;How to Guide&quot;","block_context":{"text":"How to Guide","link":"https:\/\/www.amitbhawani.com\/blog\/category\/how-to\/"},"img":{"alt_text":"Google Hacking Tricks","src":"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/05\/Google-Hacking-Tricks-300x300.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1819,"url":"https:\/\/www.amitbhawani.com\/blog\/detect-scan-adwares\/","url_meta":{"origin":1821,"position":2},"title":"How to Detect and Scan for Adwares","author":"Amit Bhawani","date":"October 21, 2008","format":false,"excerpt":"What are Adwares? Adwares, short for advertisement softwares, are software programs that are especially designed to display or prompt your computer to download advertising materials whenever you surf the Internet. Most adwares appear in the form of pop up web browsers once you visit some sites. Other times, these adwares\u2026","rel":"","context":"In &quot;Security Blog&quot;","block_context":{"text":"Security Blog","link":"https:\/\/www.amitbhawani.com\/blog\/category\/security\/"},"img":{"alt_text":"Scan Detect Adwares","src":"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/Images\/S\/scan-detect-adwares.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":12878,"url":"https:\/\/www.amitbhawani.com\/blog\/online-banking-safe\/","url_meta":{"origin":1821,"position":3},"title":"What is Online Banking &#038; Is it Safe?","author":"Guest Writers","date":"July 29, 2010","format":false,"excerpt":"Today with the advent of technology and advancement especially in the field of internet and computing; one will not have to stand in the queue for long hours to do his banking tasks. Today, most of the banks, whether public or private, provides with the facility of internet banking or\u2026","rel":"","context":"In &quot;What is Guide&quot;","block_context":{"text":"What is Guide","link":"https:\/\/www.amitbhawani.com\/blog\/category\/what-is\/"},"img":{"alt_text":"Online Banking","src":"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/07\/Online-Banking.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":12884,"url":"https:\/\/www.amitbhawani.com\/blog\/software-keep-children-safe-online\/","url_meta":{"origin":1821,"position":4},"title":"Set Restrictions on Internet Access to Keep Child Safe Online","author":"Amit Bhawani","date":"July 30, 2010","format":false,"excerpt":"It is a tedious job to keep tracking your Child's Internet access logs and also suggesting them not to visit some specific websites because of inappropriate content within them. There should also be some time limits set on the computer usage to make sure that the Child can enjoy a\u2026","rel":"","context":"In &quot;Ultimate Guides&quot;","block_context":{"text":"Ultimate Guides","link":"https:\/\/www.amitbhawani.com\/blog\/category\/guides\/"},"img":{"alt_text":"KidsWatch Parent Account Installation","src":"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/07\/KidsWatch-Parent-Account-Installation.png?fit=627%2C521&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/07\/KidsWatch-Parent-Account-Installation.png?fit=627%2C521&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2010\/07\/KidsWatch-Parent-Account-Installation.png?fit=627%2C521&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":5622,"url":"https:\/\/www.amitbhawani.com\/blog\/how-to-get-faster-internet-speed\/","url_meta":{"origin":1821,"position":5},"title":"How to Get Faster Internet Connection Speed","author":"Tony Stark","date":"September 9, 2009","format":false,"excerpt":"There are tons and tons of advices which you find every where, about how to increase the speed of your internet connection. Here is one among those which is really simple but powerful and effective. You would have got fed up, by listening to all the advices, which you have\u2026","rel":"","context":"In &quot;How to Guide&quot;","block_context":{"text":"How to Guide","link":"https:\/\/www.amitbhawani.com\/blog\/category\/how-to\/"},"img":{"alt_text":"Increase Internet Speed","src":"https:\/\/i0.wp.com\/www.amitbhawani.com\/blog\/wp-content\/uploads\/2009\/09\/Increase-Internet-Speed.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/posts\/1821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/comments?post=1821"}],"version-history":[{"count":0,"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/posts\/1821\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/media\/18645"}],"wp:attachment":[{"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/media?parent=1821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/categories?post=1821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.amitbhawani.com\/blog\/wp-json\/wp\/v2\/tags?post=1821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}