Monday, July 23, 2018

Gmails new Confidential Mail feature could put users at risk of phishing attacks: US Department of Homeland Security

Gmails new Confidential Mail feature could

Google recently started rolling out a new redesigned Gmail for the web, along with some features like the ability to snooze emails, Smart Compose, Confidential Mode and more. The redesigned app and the new features are handy for sure, but as per ABC News, The US Department of Homeland Security (DHS) has issued an intelligence note, warning users of the "potential emerging threat ... for nefarious activity" with the new Gmail redesign. The threat is particularly linked with how the Confidential Mode works.  When a mail is sent in Confidential Mode on Gmail, users need to click on a link in order to get access to it. As per the report, the DHS note says that the feature “presents an opportunity for malicious cyber actors to mimic the e-mail message and phish unwary users”. Attackers can reportedly send emails using confidential mode and make use of phishing links to get access to a victim's personal information. This could turn out to be true, however, it also depends on an individual user to be attentive and figure out whether a mail is malicious or not. According to the report, those who use third-party email clients or programs like Outlook or Apple Mail are at biggest risk of being exposed to phishing scams as they will need to enter their Google account information while accessing a “Confidential Email.” John Cohen, a former acting undersecretary of the Department of Homeland Security, told ABC News that the new confidential email system “may actually place users at a higher risk because it may support a pattern of behavior where people click on links they receive.” Brooks Hocog, a Google spokesman, says that the company aims to make communication safer. As per Hocog, Google uses its “machine learning” algorithms for detecting if the incoming emails are malicious phishing attempts or not, and that the company uses image scans to find any hidden malicious content. The scans are said to have filtered out of more than 99.9 percent of phishing attempts in Gmail. As mentioned above, the recipient of a ‘Confidential Email’ gains access to it via a link and they can’t copy, download, forward or print the email. Using the option, one can also set an expiration date for confidential emails so that it’s no longer accessible after that date and access is revoked even after the mail has been sent.

from Latest Technology News https://ift.tt/2NBdrUc

MAXIT INTERNET

BLOGGER

CD DVD RW

DELL

DOWNLOAD

FTP Server Linux

HACK

HARD DRIVE

HOW TO WORKIN

HARDWAER

INTERNET

INTERNET CAFE

LAPTOP

LENOVO

LINUX

Additional configuration for Samba Server (Part 2)  

BSNL/Airtel/Idea using Huawei E156G 3g Wireless USB Linux 5   

Basic File Extensions    CHANGING AN ACCOUNT EXPIRATION DATE   

Configure Linux as a Router   

Configure SAMBA Server (Part-1)   

Configure VNC server   

Configure Yum Server (Part-1)   

Configure yum server for Client machine (Part 3)   

Configuring Samba as a Standalone Server (Part 3)  

Connecting ftp Server with Anonymous User Part 5  

Create ftp account with Shared directory Part 3  

DHCP Server Configuration Part 2  

DHCP Server Configuration Part-1  

DHCP Server Configuration Part-3  

Enabling FTP Services in Yum Server (Part 5)  

FTP Server Configuration Part 1  

FTP Server How to Change In Primary DNS Server Part 2  

HTTP Client side configuration (Part 4)  

How to Vsftpd conf files Parameter Part 6   

LINUX FILE SYSTEM STRUCTURE  

Linux User Administrtion  

Linux as a Router configuration for Client Machine   

Linux client machine FileZilla FTP Client Part 4  

Local Yum Server (Part 2)  

Modifying Existing User Information  

Primary DNS Server Configuration Part-1  

Primary DNS Server Configuration Part-2    

Primary DNS Server Configuration Part-3  

Remove Linux From Your Pc Safely and restoring your MBR  

Sharing & Accessing Samba Share (Part 4)   

Speeding up your internet connection under Linux and Windows   

THE ROOT FILE SYSTEM   

VNC Server Configuration

LINUX LAB

Linux as a Router

MOTHERBOARD

Mobile

NETWORKING

REDHAT 5

REGISTRY EDTOR

RESET BIOS PASSWORD

SAMBA Server Linux

SERVER

SERVER CONFIG

SOFTWAER

VNC server Linux

Window 10

Window XP