FixYa Service Logo

Related Topics:

Anonymous Posted on Dec 16, 2011

Anyone else spotted the fixya security breach?

Release of my email address to third parties. My email address was created solely for login to fixya. The domain gives me infinite aliases and fixya@ has NEVER been used for any other purpose. However I have received phishing email addressed to that email address. I have recently caught out three other organisations ("carbonite", "ask-leo" and "trip advisor") who claim that their mailing lists (mismanaged by Aweber and others) were hacked or misappropriated by supposedly trustworthy parties. I suspect fixya have either been hacked (thus questioning their security) or have disclosed my email address on purpose. Please see extract of phisihing email below; it shows they are yet another organisation that can't be trusted: ------- Original Message -------- Subject: ACH transfer details Date: Wed, 14 Dec 2011 11:07:34 +0200 From: [email protected] To: fixya@ Dear Account Holder, Please find below a notification about your recent ACH debit transfer, that was delayed by our bank: Transaction ID: 467486692116828 Transaction status: pending In order to resolve this matter, please review the transaction details using the link below as soon as possible. Yours faithfully, Kathy Quirk Chief Accountant

1 Answer

  • Official Brand Answer 322 Answers
  • Posted on Jan 17, 2012
Fixya Team
Official Brand Answer
Level 0:

Joined: Oct 20, 2011
Answers
322
Questions
0
Helped
26028
Points
3745

Our customer support department has replied to this thread via email, we kindly ask that you check your registered email account. Please feel free to contact us again should you have any more questions related to this matter or should you require any further assistance.

Add Your Answer

×

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

tip

How to Protect EMAIL account from hackers?

Most of the time its difficult to judge emails,It might be sent by a hacker to take control over your account.I often come across people who is facing this problem,and sometimes its difficult to recover your email account as well2a33f54.jpg
I will give you few tips, How to protect your email account from hackers( gmail, hotmail, yahoomail etc)


  • Always remember your secondary email address-you need to provide secondary email address while creating a new email account
  • Don't use the same password for different accounts.
  • Do not entertain password reset emails-you may receive email saying you need to change password by clicking the url provided.webpage may look real,you won't be knowing hackers trick.
  • If your using wireless router to access internet (hot spot) make sure your using url as https://gmail.com....This provides more secure access
  • Register your phone number with the associated email address-In case of emergency you will receive your password through sms,This helps a lot while recovering your account.
  • If possible please make a note of few details to verify ownership
  1. Account created date
  2. Security question and answer
  3. Most frequently used email contact address.
Thank you for visiting Fixya....
Adouza -My blog
on Dec 30, 2009 • Computers & Internet
tip

Tips to Find Unauthorized Activity on Your Email Account

Do you suspect that your email account is under attack? Do you want to maintain total security of your email account and make it 100% hack proof? Well, Some times our email account might have got hacked and we may not be aware of that. We may believe that our email account is safe, but in reality our private and confidential information may be falling into the hands of a third person.
Here are some signs of unauthorized activity on an email account.
1. Your new emails are marked as Read even if you’ve not read them.
2. Your emails are moved to Trash or even permanently deleted without your notice.
3. Your emails are being forwarded to a third party email address (check your settings->forwarding).
4. Your secondary email address is changed.
If you come across any of the above activities on your email account, then it is a clear indication that your email account is hacked.
Additional Security Features in Gmailto ensure the Safety of your Account
Gmail provides an additional security feature to protect your email account through the means of IP address logging. That is, Gmail records your IP addressevery time you login to your Gmail account. So, if a third party getsaccess to your account then even his/her IP is also recorded. To see alist of recordedIP address, scroll down to the bottom of your Gmail account and you’ll see something like this.


146b5b6.jpg


You can see from the above figure that Gmail shows the IP address of last login (last account activity). You can click on Details to see the IP address of your last 5 activities. If you find that the IP listed in the logs doesn’t belong to you, then you can suspect unauthorized activity.
Steps to be carried out to stop unauthorized activity on your email account
If you feel/suspect that your account is hacked then you must immediately take the actions mentioned below
1. Change your Password
2. Change your security question.
2. Remove any third party email address (if any) to which your account is set to forward emails.
3. Make sure that you can access the email account of your secondary email address.
4. Also change you secondary email password and security question.
This ensures that your account is safe from future attacks.

on Dec 23, 2009 • Computers & Internet
0helpful
1answer

How do I sign in to my gmail account with facebook

Signing into any account by using another account is a dangerous and lazy practice. Additionally, you've shared your security details with a third party which is in breach of the agreement you have with gmail/facebook - you've given your details to a third party and not kept them to yourself.

When your gmail or facebook account eventually gets hacked, they have access to all your accounts. Not that I haven't been tempted to do something similar. I have more accounts than you might ever have and have the opportunity to 'link' them all by using facebook but won't because of the security implications.
0helpful
1answer

How can you help me to create new adress

The only way you can create a new address is to create a new account. the address you have now cannot be changed. hope this help you.
May 23, 2014 • hotmail.com
0helpful
1answer

Data Breach SCDOR123

Click start control panel administrative tools computer management then select event viewer this may vary depending on what operating system you have extend the events there you will see errors in red you will no what exactly what the error was and at what time it occured Right click on the error message select properties you will see all details about the error or click start type in event viewer press ENTER you might be able work your way through the problem
Data and security breaches Businesses store vast amounts of information. A security breach occurs when an intruder, employee or outsider gets past an organization's security measures and policies to access the data. This sort of security breach could compromise the data and harm people. There are various state laws that require companies to notify people who could be affected by security breaches.

Physical Security Breach One form of breach is a physical security breach, wherein the intruder steals physical data, such as files or equipment that contains the data. Intruders could steal computers, particularly laptops, for this purpose. Businesses should monitor access to their property to cut down on such incidents and require employees to lock away their laptops when not in use. b> Electronic Security Breach b> Another form of breach is an electronic security breach, wherein the intruder gets into a business' systems to access sensitive data. The intruder gains such access by taking advantage of any weaknesses in the systems, such as inadequate firewall protection. This could also happen if the organization does not have adequate password protection for sensitive data. This sort of security breach is one reason businesses should perform constant security updates. b> Data Capture Security Breach b> Data capture, or skimming, is a practice whereby the intruder captures and records the data on a magnetic card stripe, such as on a credit card. This form of security breach helps the intruder produce copies of credit and debit cards. The intruder could either be an employee of a merchant who handles the customer's card, or it could be an external intruder. An external intruder could attach a device to card readers or ATM machines to skim information. b> Business Response b> Businesses should be wary of security breaches. Best practices for businesses to follow include having a policy in place to deal with any incidents of security breaches. They should identify what information has been compromised and decide who are the appropriate regulatory authorities to which they should report. Affected customers should also be notified. b> Potential Threats b> Start by identifying potential threats and vulnerabilities in your organization. Employees, temps or newly fired workers who have access to data represent one such threat. Hackers trying to crack your security are another. If your business or customer data passes into the hands of third parties -- vendors, business partners or bankers, for instance -- those parties may prove to be another weak spot. Review your security systems for any obvious flaws; Risk Analytics rates incorrectly configured firewalls as one of the top security threats. b> Calculating Risk b> Once you have a list of potential threats, document which ones represent serious risks. A low-level employee who doesn't have computer access poses less of a risk than an IT staffer with a grudge. If your company doesn't have data-handling procedures to prevent accidentally revealing customer data, that's another serious risk. When calculating the level of risk, consider all the potential negative effects, such as the loss of customers, the loss of money, having to shut down your network temporarily and the blow to your company's image. Security b> Once you document the breach risks, shore up your security to prevent them. Start with the most potentially catastrophic breaches. Preventing breaches requires more than encryption and other technical fixes: Consider the human side of security, such as employees who use easily hackable passwords or don't take security seriously. Think about the security of your business partners' operation as well as your own. If you encrypt key data and carefully regulate access, you still have a problem if your partners don't follow equally strict policies. b> Rethinking b> Never assume that, once you've documented your breach risks, you can rest easy. The information technology landscape changes constantly, creating new vulnerabilities. Mobile-payment technologies that allow shoppers to make credit and debit purchases with smartphones, for instance, are a new field. The field is growing steadily, but it lacks any common security standard. The apps are easy to develop, but developers do not always make security a priority. Review the risks created by new technology if you want to stay on top of new breach dangers. Hope this helps


b>
0helpful
1answer

How do i get to my mail

do you want to set up an email account ?

Anyone can have an email address!

These days, email is a mandatory part of communication.

It's a cheap and easy way to send a message to anyone you know.


Decide what email provider you wish to use for your email service.

If you need a personal account for basic email activity, any of the major website email services can provide you with a package that will fit your needs.


The major free email providers are Google, Yahoo, and MSN Hotmail. For this article's purposes, we will be using Google's Gmail email service.


In your website's address bar, type www.google.com, and hit "enter."

In the top left-hand corner of the page, you will see the words "web", "images", "maps", "news", "shopping", "Gmail", and "more". Click on the word "Gmail."


You will be taken to the Google Mail access page. Since you do not have a Gmail account, you will click on the phrase "Sign up for Gmail" that is located on the lower right-hand side of the page.


Enter your first and last name in the boxes, then create your "desired login name."

This is the name that will be at the first of your email address.


For example, if your name is "Jane Doe" and you want your email address to reflect your name, you would put "JaneDoe" together in the desired log-in box.


Click on the "check availability!" button, to see if anyone else has already claimed your log-in name. If the name isn't available, Google will give you a list of available options that are similar to your requested login name.


If you do not agree with any of the recommended log-in names, then be creative by adding your birthday or another set of numbers that is memorable to you.


For example, "JaneDoe" may not be available, but "JaneDoe1966" might be up for grabs. Take your time with this step and develop a log-in name that is comfortable and important to you.


Create an email account password. Google requires your passwords to be a minimum of 8 characters in length.

You can create a password using letters, numbers, or symbols combined.


Passwords are tricky because you don't want to create one that you will forget, but you don't want to have a password that is too easy for others to guess.


Do your best to create a "strong" password that will withstand the attempts of potential hackers. A good password that could be virtually "unguessable" by others would be the combination of your grandmother's maiden name and her birth month and year.


For example, if your grandmother's maiden name is "Curtis" and her birthday is November 24th, your password could be "curtis1124." Note: if you capitalize any of your password's letters, then you must capitalize it every time you enter it.


Create a "security question."

This question might help you out later on, if you've forgotten your password and need help getting new one.


Choose a question from the selected questions and plug in your answer.

You should write down your question and answer so that you can remember it if need be.

The next step is to enter a secondary email address, but if you do not have another email you can leave this spot blank.


It is required to email your alternate address in the event you forget your password to this address.


Enter the "word verification" into the box.

The letters, numbers or symbols might appear a bit distorted, so be careful to decipher then correctly before you type them into the box.


This step is done for security and ensures that you are not a spammer.


Read through the "terms of service" to make sure you are clear on your accounts requirements.

If you agree with the terms, click the button "I accept.

Create my account" button.

Congratulations! You now have an email address!


Hope this helps



0helpful
1answer

I forget my Password but i m not reset my password when i login facebook login unsucessfull the message is try again send me my passwoed on my email address

Several problems with your question. One, we do not have the resources to obtain that kind of info. Two, obtaining that info is ILLEGAL for an outside party to do. Third, you did not provide your email address, and lastly, Facebook policy does not allow them to recover passwords for security reasons. You can only reset your password. This is an issue that FixYa cannot resolve, and is strictly between you and facebook.
0helpful
1answer

I have forgotten login and password for itunes, i used for my daughters ipod classic over 18 months ago and now cant seem to login and would love to be able to download some new music, it wont let me open...

I had the exact same problem just a week ago.. Easiest way around it is to create another email address with the same email address as your first one but changed slightly eg;

If mine was [email protected] the first time.
Create another one but changed slightly [email protected] .

This should solve your problem.
Not finding what you are looking for?

106 views

Ask a Question

Usually answered in minutes!

Top FixYa Computers & Internet Experts

ZJ Limited
ZJ Limited

Level 3 Expert

17989 Answers

Rob Hill
Rob Hill

Level 3 Expert

1480 Answers

Grand Canyon Tech
Grand Canyon Tech

Level 3 Expert

3867 Answers

Are you a FixYa Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...