DATA STEALING FROM E-MAIL
HOW TO STEAL DATA FROM AN E-MAIL?
- Social Engineering.
- Exploiting the Vulnerabilities in security.
- Keyloggers and browser monitoring.
SOCIAL ENGINEERING-
Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery for information gathering or computer system access and in most cases the attacker never comes face-to-face with the victim. Social engineering is considered a revolutionary art among the hacker community; it has proven to be an interesting tool that can be exploited by anyone. All social engineering techniques are based on flaws in human logic known as cognitive biases. Some of these attacks are:
- Pretexting.
- Phishing.
- IVR/phone phishing.
- Trojan horse.
- Road apple.
SECURITY VULNERABILITY
Vulnerabilities are security flaws or holes through which hackers can infiltrate. These holes can provide the hacker access to the mailbox without even the permission of the user. Sometimes the administrator is negligent in patching the vulnerability in security. The hacker makes use of the vulnerability at this point and steals confidential data without the consent of the user.
KEYLOGGERS
A Key logger is a type of surveillance software or spyware that has the capability to record every keystroke you make to a log file, usually encrypted. A Key loggers recorder can record instant messages, e-mail, and any information you type at any time using your keyboard. The log file created by the Key loggers can then be sent to a specified receiver.