Tag Archives: Social engineering (security)

Help Series For Hacked Websites and Emails

I believe it’s part of our duty to watch out for our neighbors and online community. We probably all know someone who was hacked, or had their passwords stolen. Were you one of the few that responded to their email to notify them of their little problem?


Mother Nature Network Google Adds Help Series for Hacked Websites The announcement begins with an overview video that describes how and why sites are hacked, followed by a video that describes how to assess what has been changed…

Juliana Payson‘s insight:

We aren’t just protecting ourselves, but those we engage with. Google has recognized this duty of responsibility to their audience. I’ve often had to painfully explain to website owners that their website got hacked, and they opened the door. These videos are a relief because it takes the pressure of webmasters having to explain ‘themselves’ in a defensive manner to website owners including the whys and wherefore’s of all this happening.

Keep your computer safe from hackers. Before you click on a link in an email, ask yourself a few questions: do you recognize the domain name? Is your name spelled correctly in the email? What time was the email sent?

Juliana Payson‘s insight:

Hackers can email booby-trapped links or attachments to targeted individuals, once a falsified link is clicked, the hackers are in. This article from PBS explains so simply how disguised pages can capture your universal password. Solution, make sure you educate your clients into recognizing the correct “domain” in the address bar before inputting their password. Also, never use universal passwords.

Phishing and spear phishing have long been thought to be mutually exclusive hacking tricks, but cybercrooks have found a way to combine the two in a technique called longline phishing.

Juliana Payson‘s insight:

Not only is mass emailing via multiple proxies a way for hackers to avoid spam detection, but cloaking has become more refined making it harder for email phishing victims to recognize a bad link. Hopefully you will be able to recognize the techniques people use to compromise your access and information, and that’s half the battle with cyber-crime.  Just understanding these techniques makes you all the more web-savvy and able to protect yourself, and your community.


Have you been a victim of hacking? Let me know what you did about it here or on my Google Plus, and it may very well come in handy for our webmaster audience – Juliana.