Friday, May 9, 2025
Homecyber securityAre There Security Vulnerabilities in Gmail Even in 2020

Are There Security Vulnerabilities in Gmail Even in 2020

Published on

SIEM as a Service

Follow Us on Google News

Gmail is one of the biggest email service provider. It is owned by Google and it’s used by over 1.5 billion people. Despite all its success, there are still concerns about the security Gmail offers to its users. There is no denying that it offers one of the best services in the world and there is no other in its competition, but it has a huge responsibility considering its popularity.

All ethical hackers and IT experts try to look for loopholes to prove their skills. After all, what could be better than humbling the biggest technology company in the world? 

This article has discussed some of the security vulnerabilities of Gmail that the whole world has witnessed. It solves those issues right way and in the best manner possible, but it doesn’t mean there are no more weaknesses.

- Advertisement - Google News

Secondary Email Could Get You Hacked

In 2016, a Pakistani dude named Ahmed Mehtab showed how he could hack a Gmail ID that has added a secondary email. He even made a video showing the vulnerability and how he exploited it. Ahmed also shared all the reasons behind that loophole and how Gmail can improve it. However, it also doesn’t mean that anyone can hack gmail and any email.

There have to be certain conditions in which they can get unauthorized access. Considering the users of Gmail, there would be hundreds of thousands of people with that setting. The Gmail sends a verification email that can be sent to any other address, if:

  • The original recipient’s SMTP is offline
  • It has to block a user
  • It doesn’t exist
  • The email is deactivated

ISP Can Monitor Your Mails

Although there isn’t much Gmail can do about it, many people don’t trust their government. While they are obligated to follow all orders of a court, there are also other agencies that don’t ask for court permission. They have control over the Internet Service Provider to monitor online traffic of any user. They can also view text and files in each email. You may have to encrypt your emails if you want to keep them private. You can learn more about keeping your Gmail secure at https://trustifi.com/how-to-send-secure-email-attachments-in-gmail/

New User’s are Most Unsafe

People who have been using Gmail for years or have a good understanding of technology can keep themselves safe. They set all their emails to ensure maximum security. Gmail also offers features to enhance online security. However, a new user wouldn’t know to apply those settings. This leaves non-technical people vulnerable to the mercy of exploiters. These features should either be set by default or made easy, so no one has any difficulty using them.

Without Two-Factor Authentication

It’s not the most difficult thing to hack someone’s password. Gmail sends a text message to the mobile phone of the user even when someone enters the correct password. However, there are multiple ways to get around that and provide the right verification code to open the inbox, and it has happened many times. Gmail also offers two-factor authentication to use another medium to ensure you are an authorized user, but there isn’t much security wit

Latest articles

Azure Storage Utility Vulnerability Allows Privilege Escalation to Root Access

A critical vulnerability discovered by Varonis Threat Labs has exposed users of Microsoft Azure’s...

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score...

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux,...

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security...