recentpopularlog in

bwiese : email   121

« earlier  
Hackers could read non-corporate Outlook.com, Hotmail for six months | Ars Technica
Late on Friday, some users of Outlook.com/Hotmail/MSN Mail received an email from Microsoft stating that an unauthorized third party had gained limited access to their accounts, and was able to read, among other things, the subject lines of emails (but not their bodies or attachments, nor their account passwords), between January 1st and March 28th of this year. Microsoft confirmed this to TechCrunch on Saturday.

The support account would also have only had access to free Outlook.com/Hotmail/MSN-branded accounts, and not to paid Office 365 email.

reason for the hack in the first place- access to the iPhone user's email account, it's possible to dissociate the phone from the iCloud account, and subsequently to reset the handset
cybersecurity  outlook  email  iphone 
april 2019 by bwiese
xkcd: PGP
How to use PGP to verify that an email is authentic:
Look for this text at the top... if it's there, the email is probably fine.
pgp  humor  gpg  email 
march 2019 by bwiese
In Apple Mail, There’s No Protecting PGP-Encrypted Messages
In a nutshell, the EFAIL attack works like this: First, the attacker needs a copy of a message that’s encrypted to your public key. They could get this by hacking your email account, hacking your email server, compelling your email provider to hand it over with a warrant, intercepting it while spying on the internet, or other ways. PGP was specifically designed to protect against this — the promise of PGP is that even attackers with copies of your encrypted messages can’t decrypt them, only you can. When you receive an email that’s encrypted to your public key, your email client automatically uses your secret key to decrypt it so that you can read it. The EFAIL researchers discovered that they could craft a special email that secretly includes a stolen encrypted message within it, and then send it to you. When you receive the malicious email, your email client uses your secret key to automatically decrypt the pilfered message within the malicious email, and then sends a decrypted copy of the stolen message back to the attacker — for example, through a web request to load an image into the email.
efail  encryption  pgp  gpg  email  cybersecurity 
june 2018 by bwiese
It has been a bad week for encrypted messaging and it’s only Wednesday | Ars Technica
Monday brought word of decade-old flaws that might reveal the contents of PGP- and S/MIME-encrypted emails. Some of the worst flaws resided in email clients such as Thunderbird and Apple Mail, and they offer a golden opportunity to attackers who have already intercepted previously sent messages. By embedding the intercepted ciphertext in invisible parts of a new message sent to a sender or receiver of the original email, attackers can force the client to leak the corresponding plaintext. Thunderbird and Mail have yet to be patched, although the Thunderbird flaw has been mitigated by an update published Wednesday in the Enigmail GPG plugin.
cybersecurity  encryption  pgp  signal  email  javascript  crypto 
may 2018 by bwiese
Curbing the BEC Problem Using AI and Machine Learning - Security News - Trend Micro USA
mimic the decision-making process of a security researcher through a form of AI called Expert System. The engine will check if an email is coming from a dubious email provider, as well as the similarity of the sender’s domain to that of the target organization. It will also check if the sender is using a name of an executive at the recipient’s organization, among other factors. The engine’s “high-profile user” function applies additional scrutiny and correlation with commonly spoofed senders (such as executives at the target organization) and their real email addresses.
expertsystem  ai  machinelearning  bec  cybersecurity  email  workflow 
may 2018 by bwiese
British Schoolboy Who Hacked CIA Director Gets 2-Year Prison Term
Kane Gamble, now 18, hacked into email accounts of former CIA director John Brennan, former Director of National Intelligence James Clapper, former FBI Deputy Director Mark Giuliano, and other senior FBI officials—all from his parent's home in Leicestershire.
Gamble, who went by the online alias Cracka, was just 15 at the time of carrying out those attack
cia  fbi  email  hack  uk  compromise 
april 2018 by bwiese
DMARC - Wikipedia
https://www.axios.com/outgoing-white-house-emails-not-protected-by-verification-system-deafc584-759b-4c8f-969a-3ced8a8059f8.html

Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email-validation system designed to detect and prevent email spoofing. It is intended to combat certain techniques often used in phishing and email spam, such as emails with forged sender addresses that appear to originate from legitimate organizations. Specified in RFC 7489, DMARC counters the illegitimate usage of the exact domain name in the From: field of email message headers.[1]

DMARC is built on top of two existing mechanisms, Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM). It allows the administrative owner of a domain to publish a policy on which mechanism (DKIM, SPF or both) is employed when sending email from that domain and how the receiver should deal with failures. Additionally, it provides a reporting mechanism of actions performed under those policies. It thus coordinates the results of DKIM and SPF and specifies under which circumstances the From: header field, which is often visible to end users, should be considered legitimate.
email  cybersecurity  dmarc 
april 2018 by bwiese
IBM X-Force IRIS Uncovers Active Business Email Compromise Campaign Targeting Fortune 500 Companies
IBM X-Force Incident Response and Intelligence Services (IRIS) assesses that threat groups of likely Nigerian origin are engaged in a widespread credential harvesting, phishing and social engineering campaign designed to steal financial assets.
cybersecurity  email  ibm 
february 2018 by bwiese
The World’s Email Encryption Software Relies on One Guy, Who is Going Broke - ProPublica
Update, Feb. 5, 2015, 8:10 p.m.: After this article appeared, Werner Koch informed us that last week he was awarded a one-time grant of $60,000 from Linux Foundation's Core Infrastructure Initiative. Werner told us he only received permission to disclose it after our article published. Meanwhile, since our story was posted, donations flooded Werner's website donation page and he reached his funding goal of $137,000. In addition, Facebook and the online payment processor Stripe each pledged to donate $50,000 a year to Koch’s project.

The man who built the free email encryption software used by whistleblower Edward Snowden, as well as hundreds of thousands of journalists, dissidents and security-minded people around the world, is running out of money to keep his project alive.

Werner Koch wrote the software, known as Gnu Privacy Guard, in 1997, and since then has been almost single-handedly keeping it alive with patches and updates from his home in Erkrath, Germany. Now 53, he is running out of money and patience with being underfunded.
gpg  email  encryption  gnu 
june 2016 by bwiese
Ask The Headhunter: A Challenge to LinkedIn -- Grow Some Integrity! | The Business Desk with Paul Solman | PBS NewsHour | PBS
Enough Already

The user has already declined three times to provide access to all his contacts. Now he is asked a fourth time. Is it any wonder that some users finally acquiesce, even if it's only because they're confused about whether LinkedIn already has their email information?
socialnetwork  legal  privacy  linkedin  email 
october 2013 by bwiese
Retrobituaries: Edsger Dijkstra, Computer Scientist | Mental Floss
In our Retrobituaries series, we highlight interesting people who are no longer with us. Today let's explore the life of Edsger Dijkstra, who died at 72 in 2002.

If you’ve used a computer or smart phone in the last few decades, you’ve come into contact with the work of Edsger Dijkstra. Since his death in 2002, his research in the field of computer science has in many ways only grown more important. Here are a few things you didn’t know about his life and his science.
education  email  netherlands  algorithm  professor  history  computerscience  dijkstra 
april 2013 by bwiese
Special Reports - The Terrorist's Tricks And Counter-Measures | Al Qaeda's New Front | FRONTLINE | PBS
+ Two terrorists on opposite sides of the globe might agree to open 30 anonymous web-based e-mail accounts with 30 different passwords. On the first of the month the first account is used, on the second of the month the second account is used and so on, until each account is used once.

"It's very difficult to catch, because there is no pattern of use," former U.S. counter-terrorism czar Richard Clarke says. "One-time anonymous accounts are extremely difficult to monitor."

+ One terrorist drafts a Web-based e-mail and instead of sending it, saves it to the draft folder, accessible online from anywhere in the world. The other terrorist can open the same account, read the message, and delete it. The e-mail has never been sent, and cannot be tracked.

+ Many e-mails are sent on public computers, for example in libraries or cyber cafés, making them even more difficult to trace.

+ The language in the e-mails can also be cloaked, architecture" (the World Trade Center), "arts" (the Pen
fbi  terrorism  privacy  email 
november 2012 by bwiese
Petraeus reportedly used draft e-mails to converse with mistress | Security & Privacy - CNET News
Petraeus and Paula Broadwell, the co-author of Petraeus' biography and the woman he was having an affair with, set up private Gmail accounts in order to communicate, the Associated Press reported today. In addition to creating the e-mails under false identities, Petraeus and Broadwell decided to exchange some messages using the draft function, as an added precaution.

Instead of actually e-mailing each other, they would compose and draft messages but not send them. The other person would then log into the same account and read the drafts. This made those messages harder to trace, and the tactic has been used in the past by terrorists and teenagers, an unnamed law enforcement official told the AP.

Apparently, this trick has been around a while. PBS Frontline mentioned it in a 2005 special on terrorist tricks and counter-measures.
draf  terrorism  politics  email  privacy 
november 2012 by bwiese
Petraeus e-mail affair highlights U.S. privacy law loopholes | Politics and Law - CNET News
In a legal brief (PDF) filed with a federal appeals court in a previous case, the Justice Department argues that draft e-mail messages aren't in "electronic storage" and therefore "do not" require the FBI to obtain search warrants to peruse them.

Another oversight in the 1986 law, called the Electronic Communications Privacy Act (ECPA), is that you won't even know if police are poking through your e-mail accounts. (Contrast this with the notification requirements for searching bank records.)

Courts have not required police to notify account holders of e-mail searches. In a 2009 ruling (PDF), a federal district judge in Oregon ruled that notifying the Internet or Web e-mail provider was sufficient under both ECPA and the Fourth Amendment. The court's conclusion: the "notice requirement is satisfied when a valid warrant is obtained and served on the holder of the property to be seized, the ISP."
fbi  politics  email  privacy 
november 2012 by bwiese
Hacked! - Magazine - The Atlantic
She did so, and logged into her Gmail account with enormous relief, which lasted perhaps five seconds. When she looked at her Inbox, and her Archives, and even the Trash and Spam folders in her account, she found—absolutely nothing. Of her allocated 7 gigabytes of storage, 0.0 gigabytes were in use, versus the 4+ gigabytes shown the day before. Six years’ worth of correspondence and everything that went with it were gone.
google  security  hacker  gmail  email  hacked  passwords 
october 2011 by bwiese
Changing Mozilla Thunderbird Forward as Attachment to Forward Inline – The Telarah Times
Go to Tools ==> Options ==> Composition ==> General Tab and change the Forwarded Messages: field from "As Attachment" to "Inline"
thunderbird  email  attachment  howto  techsupport 
june 2011 by bwiese
Using an address email "+" alias - FAIL: Gmail Help
nearly every website/form blocks submission of email addresses with + signs in them
email  tips  spam  gmail  google  fail  alias 
march 2011 by bwiese
Send Large Files FREE - Send unlimited files, up to 2GB each
this one is pretty awesome... assign your emails, then upload
however the godaddy ssl certs expired
send  upload  file  transfer  email  service  internet 
january 2011 by bwiese
7 ways to organize your email
saved search folders - flagged (for followup) color is priority heirarchy
outlook  techsupport  email  search  advice  tips  productivity 
january 2011 by bwiese
Exactly What To Say In A First Message " OkTrends
compliments - but not looks - mention specifics - be self effacing (sorry but never say please)
"you mentioned", good taste, noticed that, curious about...
engage their own interests... band, food, music/movies
unusual greeting: how's it going, howdy, what's up (no hello,hi,holla,hey)
pretty much, pretty sure/good... but not you're pretty/very pretty
awesome, fascinating, cool... but not cutie, beautiful, sexy, hot
language  okcupid  dating  advice  statistics  email  communication  psychology 
september 2010 by bwiese
Send SMS or Text Messages to Cellular phones
Alltel @message.alltel.com
AT&T @mms.att.net
Nextel @messaging.nextel.com
Sprint @messaging.sprintpcs.com
SunCom @tms.suncom.com
T-mobile @tmomail.net
VoiceStream @voicestream.net
Verizon @vtext.com (text only)
sms  cellphone  howto  email 
december 2008 by bwiese
norword lessons --email lessons
I don't know where the list server is anymore?
norwegian  norway  language  edu  tutorial  email 
july 2008 by bwiese
Jott™ - Official Site
call Jott, leave message, receive text email reminder
email  speech  phone  mobile  gtd  tools  service  message  productivity 
may 2008 by bwiese
« earlier      
per page:    204080120160

Copy this bookmark:





to read