Skip to main content

Think Your Friend’s Gmail Account Was Hacked? Report to Google

Almost two years ago, Microsoft introduced a feature that allowed friends to report hacked Hotmail accounts directly to the company. When someone’s email account gets hacked, it’s usually the friends who start noticing unusual activity. It starts with spam messages with extraordinary stories of their friend stranded abroad with no cash. Will they wire some money to a strange address, please? It’s an old trick and is surprisingly effective. A Hotmail user could report such emails by selecting an option called “My friend’s been hacked!” from the “Mark as” button. This sends an alert to Microsoft. The attacker is blocked from accessing the account, and then the real user can start the account recovery process.

Recently, Lifehacker writer Adam Pash stumbled upon a not very well known feature on Gmail that seems to have been inspired from Hotmail.

If you start receiving spam from your contacts, you can mark the email as suspicious. Doing thus will mark the message as ‘sent from a compromised account’, and a report will be sent to the Gmail team. Your contact's account will not be penalized and you'll continue to receive messages from this account in the future. Reporting accounts will help Google improve their detection of compromised accounts, but whether or not it will allow the victim to recover their account is not very clear.

This option is available when you click on the “Spam” button at the top of the email.

spam

If the sender is one of your contacts, you will see an alert box like the one shown below.

suspicious-message

If you believe that the message is not a scam or malicious but you simply did not want to receive it, click on “Message is just spam” instead to mark it as as spam and to make the alert disappear.

Do note that you can report suspicious accounts only when the sender is in your Gmail contact list. If the sender is not in your contact list, clicking the “Spam” button simply removes the message from your inbox and into the spam folder.

Comments

Popular posts from this blog

How to Record CPU and Memory Usage Over Time in Windows?

Whenever the computer is lagging or some application is taking too long to respond, we usually fire up task manager and look under the Performance tab or under Processes to check on processor utilization or the amount of free memory available. The task manager is ideal for real-time analysis of CPU and memory utilization. It even displays a short history of CPU utilization in the form of a graph. You get a small time-window, about 30 seconds or so, depending on how large the viewing area is.

How to Schedule Changes to Your Facebook Page Cover Photo

Facebook’s current layout, the so called Timeline, features a prominent, large cover photo that some people are using in a lot of different creative ways. Timeline is also available for Facebook Pages that people can use to promote their website or business or event. Although you can change the cover photo as often as you like, it’s meant to be static – something which you design and leave it for at least a few weeks or months like a redesigned website. However, there are times when you may want to change the cover photo frequently and periodically to match event dates or some special promotion that you are running or plan to run. So, here is how you can do that.

Diagram 101: Different Types of Diagrams and When To Use Them

Diagrams are a great way to visualize information and convey meaning. The problem is that there’s too many different types of diagrams, so it can be hard to know which ones you should use in any given situation. To help you out, we’ve created this diagram that lays out the 7 most common types of diagrams and when they’re best used: