Skip to main content

Finding when yahoo email address is compromised and how to handle it


Recently, I am seeing people's  yahoo  email being compromised.


What happens is, a fake message is sent to  all the contacts of that yahoo email,  asking for money. 

The owner of the email, generally is not aware of this. 

Apart from this type of email, other types of spam emails are also sent regularly, from the yahoo email.

How can we spot this type of attack ?

In your contacts list, add one of your other email address like hotmail or gmail. 

When this type of message comes out, a copy is received in your other email address. 
So, you will know your account is compromised, immediately.

When this happens  I strongly suggest to wind up that account.

First, change the password.
Second, create another yahoo email address.  Inform all your contacts about this new yahoo email address. 
Third, stop using old yahoo email address. Also, report that email address is compromised to yahoo.

As a precaution for your friends, you can have the habit of signing your email in a particular way.
Tell them this is how you end your email.
For example, you can end the email message with, Best wishes from , or,  With all best regards, etc. 

If they see any emails without the regular style, it should be considered a suspicious one. 
My Google Plus Profile

Comments

Popular post

Building Websites on Dial-Up Taught Me a lot about User Experience

  When we think of user experience today, we often picture sleek mobile apps, lightning-fast websites, and seamless interactions. But my journey with user experience began in the late 1990s and early 2000s — a time when most of us were connecting to the internet using noisy dial-up modems. Every second online was precious because it was both slow and expensive. Designing for that environment taught me lessons about user experience that remain just as relevant — if not more — in today’s digital landscape. 1. Speed is Everything On dial-up, even a simple image could take 30 seconds to load. This forced me to think critically about every element on the page. Do we really need that graphic? Can we compress it further? Could we use text where others would use images? The result was websites that prioritized performance before performance became a buzzword. Today, with mobile networks and global audiences, the lesson is the same: users don’t wait. Speed isn’t just technical — it’s ...

Digital Transformation Is Not About Tools, It’s About People

When people talk about “digital transformation,” the conversation almost always begins with tools: cloud platforms, CRMs, automation software, AI. The latest shiny object becomes the centerpiece of the discussion. But in my journey — from building early AI projects in the 90s, to creating dot-com businesses on dial-up connections, to developing enterprise portals and online workforce systems — I’ve learned something important: **technology by itself doesn’t transform a business. People do.** *** Tools Are Enablers, Not the Destination Think back to the early 2000s, when many businesses rushed to create websites. Most stopped at making them digital brochures. The websites existed, but the businesses didn’t transform. Transformation only happened when entrepreneurs realized they could use technology to automate processes, generate revenue, and strengthen customer relationships. The same is true today with cloud, AI, and automation. Tools are only enablers. Without people to reimagine wor...

Clean all temporary files in your PC using CCleaner

We tend to accumulate lot of temporary files in our PC. These files come from various sources including web pages, media files, etc. To properly clean temporary files, you can use CCleaner software. You can download it free. It is quite easy to clean the temporary files also. Step 1: Load CCleaner  CCleaner initial screen Ensure that you are in the option Cleaner. It is better to click on the option Cleaner.  You can see the button Analyze at the bottom Step 2: Click on Analyze button It will show you  what types of temporary files are present. After Analyze button is clicked  In this screenshot, you can see that, it shows the files related to Internet Explorer, Recycle Bin, Google Chrome. Once you see this, you can take action. Step 3: Click on Run Cleaner button you see at the bottom right.  Confirmation to delete  The software will ask you for confirmation. Click on OK button. After cleaning is complete Now CCleaner has deleted the te...