cyber security

Are There Security Vulnerabilities in Gmail Even in 2020

Gmail is one of the biggest email service provider. It is owned by Google and it’s used by over 1.5 billion people. Despite all its success, there are still concerns about the security Gmail offers to its users. There is no denying that it offers one of the best services in the world and there is no other in its competition, but it has a huge responsibility considering its popularity.

All ethical hackers and IT experts try to look for loopholes to prove their skills. After all, what could be better than humbling the biggest technology company in the world? 

This article has discussed some of the security vulnerabilities of Gmail that the whole world has witnessed. It solves those issues right way and in the best manner possible, but it doesn’t mean there are no more weaknesses.

Secondary Email Could Get You Hacked

In 2016, a Pakistani dude named Ahmed Mehtab showed how he could hack a Gmail ID that has added a secondary email. He even made a video showing the vulnerability and how he exploited it. Ahmed also shared all the reasons behind that loophole and how Gmail can improve it. However, it also doesn’t mean that anyone can hack gmail and any email.

There have to be certain conditions in which they can get unauthorized access. Considering the users of Gmail, there would be hundreds of thousands of people with that setting. The Gmail sends a verification email that can be sent to any other address, if:

  • The original recipient’s SMTP is offline
  • It has to block a user
  • It doesn’t exist
  • The email is deactivated

ISP Can Monitor Your Mails

Although there isn’t much Gmail can do about it, many people don’t trust their government. While they are obligated to follow all orders of a court, there are also other agencies that don’t ask for court permission. They have control over the Internet Service Provider to monitor online traffic of any user. They can also view text and files in each email. You may have to encrypt your emails if you want to keep them private. You can learn more about keeping your Gmail secure at https://trustifi.com/how-to-send-secure-email-attachments-in-gmail/

New User’s are Most Unsafe

People who have been using Gmail for years or have a good understanding of technology can keep themselves safe. They set all their emails to ensure maximum security. Gmail also offers features to enhance online security. However, a new user wouldn’t know to apply those settings. This leaves non-technical people vulnerable to the mercy of exploiters. These features should either be set by default or made easy, so no one has any difficulty using them.

Without Two-Factor Authentication

It’s not the most difficult thing to hack someone’s password. Gmail sends a text message to the mobile phone of the user even when someone enters the correct password. However, there are multiple ways to get around that and provide the right verification code to open the inbox, and it has happened many times. Gmail also offers two-factor authentication to use another medium to ensure you are an authorized user, but there isn’t much security wit

PricillaWhite

Recent Posts

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently detailed…

10 hours ago

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria Stealer,"…

10 hours ago

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton Pass,…

10 hours ago

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly sophisticated…

10 hours ago

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials

Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations designed…

10 hours ago

Cybercriminals Exploit Public-Facing IIS, Apache, and SQL Servers to Breach Gov & Telecom Systems

A recent investigation by Unit 42 of Palo Alto Networks has uncovered a sophisticated, state-sponsored…

10 hours ago