Send Anonymous Email | Stealth Internet Rotating Header Image

Email Security

Another Cyber Attack from Hamas?

Another threat from Hamas

Recently, some Israelis were alerted because of the spreading emails threatening an attack to Palestine. The emails state that 1,330 Islamist fighters infiltrated Palestine and would kill prominent people. The email account was registered in Google’s Gmail, which enables one to open an account without identification. The people who received the messages received another one later. The next emails came from the man who calls himself “Youth of Islam” and the emails contain the title “The End of Israel.” The messages were written in Arabic, Hebrew, and English. According to reports, the sender probably used the automatic translation services because of the grammatical errors in the messages.

The puzzle

What’s more surprising is that those who received the emails claimed that their email addresses are not the ones they are using for commercial and other purposes that would make these addresses accessible to external sources. One recipient of the controversial emails said that his email address rarely receives spam. The email was sent on behalf of al-Qassam, the armed branch of the Hamas; the sender does not actually have an identification. Until now, it’s still a puzzle if the emails were really sent by al-Qassam.

Different hacking methods

But how could the email addresses of various people be accessed by the sender, when they claimed that their addresses were secured from external sources? There are actually various ways to hack this info. Some of the ways include the use of JavaScript to make the browser send an message to a specific email address with the address configured into the browser. Another is by making the browser fetch the images in the page through an anonymous FTP connection.

What’s the Big Deal with the BlackBerry?

The recent issue regarding Obama’s stand to keep his BlackBerry PDA-phone despite the NSA or National Security Agency’s stand that he should use the NSA’s favored Sectera Edge raises some questions from curious individuals. What’s with Sectera Edge? Why does NSA favor this over theBlackberry?

General Dynamics’ Sectera Edge is certified by the NSA for Top Secret emails, websites, and communications. Sectera Edge uses secure protocol to encrypt all communications, thereby, making sure that hackers and other cyber criminals will not succeed in accessing the information from the phone. BlackBerry, on the other hand, does not meet the security standard required by the NSA. For one, BlackBerry can easily be infected by malware and virus that can make the PDA-phone accessible to hackers. Emails can also be intercepted in BlackBerry. Aside from this, the latter has built-in GPS that would make it easy to pinpoint the location of the user.

Because of the very advanced technology that hackers and cyber criminals used to spread crime online, it is understandable that the National Security Agency would not easily give up its stand just to give in to Obama’s whim. Actually, former US presidents such as Clinton and Bush gave up their email during their time in office.

The final decision

The National Security Agency has now made its decision, and that it is allowing President Obama to use BlackBerry to communicate with some high-ranking officials and friends. However, he will be using the Sectera Edge in activities relating to the affair of the state.

Warding Off Hackers Through Email Encryption

Email is among the most useful tools that people use whether for personal or business purposes. One’s email account is actually a bank of very important information. The email account may also serve as a library where people can store their precious finance-related files. Another important function of an email is that is it a means to transmit information, from the most trivial to the most important.

Because of the important role that email plays in people’s everyday affairs, it is one of the favorite targets of cyber criminals. Among these cyber criminals are hackers. Hackers can actually intercept the messages you send through email. However, there are ways through which you can combat hackers. One of the easiest and more secure ways is by using email encryption.

What is email encryption

Email encryption is a system in which your email message is encoded as codes and can only be decrypted if the recipient has the key. Through email encryption, hackers cannot access the content of your email. For further protection, you can use the digital signature so that your intended recipient can verify if the message really comes from you.

How do you find a tool for email encryption

There are actually various sites online that offer software that you could use to encrypt your email. In some sites, you can download email encryption software for free. However, there are also various sites that ask for a certain amount of money for the software.

Cyber Crimes Against Women

Cyber crime is a common phenomenon today. Because of the fast advancement of technology, more sophisticated software are developed and used as weapons for committing complex and sometimes untraceable cyber crimes. Everybody can be a potential victim. However, there are reports stating that a large percentage of cyber crime cases have women as victims. There are actually various women who were subjected to various different types of cyber crimes. However, many women prefer to ignore the harassment they experienced.

Cyber crimes against women

One of the most common crimes on the Internet committed against women is cyber stalking. This crime involves stalking the victim by following her online affairs. The stalker usually enters the same chat rooms and discussion groups in which the victim is a member of and floods her with obscene emails. Another cyber crime against women is cyber pornography. This involves blackmailing the victim to make her pose nude. There is also another type of cyber crime which is called morphing. This crime involves the posting of a computer-manipulated photo of a nude woman on a website. Various women are also the common victims of email spoofing. Email spoofing usually happens in online dating. Usually, a man takes the identity of someone else and sends romantic emails to a woman, promising her a date, but then she should first send a certain amount of money to her date.

How to help stop cyber crime

If you have been a victim of cyber crime, you should immediately report it to the authorities. You should not suffer in silence and wait for the next cyber crime to strike.

Protect Your System from Valentine’s Day Malware

As Valentine’s Day is fast approaching, Valentine’s Day e-cards are proliferating. However, sweet and romantic e-cards are not the only ones on the loose. Spammers and other cyber criminals actually use this time of the year to spread more malware. This is why it is necessary that you take extra caution when opening emails on Valentine’s Day.

You might be surprised when you see an e-card from an unknown source upon logging into your email account. However, don’t get overly excited even if you think your crush might have sent you an e-card. Chances are, this e-card came from spammers and it may carry a link that would take you to a site that hides malware.

How to avoid malware

When you receive an e-card from an unknown source, you should be skeptical. Don’t click the link you may find in the email because it may lead to the automatic download of malicious software to your system. If the sender is a legitimate company, visit the official site by typing the URL in the browser rather than by following the link. You should not also respond to the sender of the e-card. It is better to delete the anonymous e-card that you suspected of having malicious content than take the risk of installing a software that could weaken the resistance of your system and make your computer vulnerable to viruses, worms, and hackers. Another thing that you should do is to install an anti-virus and anti-spam software to help you detect content that could pose threat to your system.