Anatomy of compromising email accounts

  title={Anatomy of compromising email accounts},
  author={Sangeeta Khanna and Harish Chaudhry},
  journal={2012 IEEE International Conference on Information and Automation},
Click! You open an email and you are hacked. Your password reaches the hacker while you read the contents of the innocuous looking email. With hacking on an upward spiral, hacking of an email account occurs everywhere. An email account becomes a lucrative proposition if it is deployed on a domain which has critical importance in terms of data, both from a commercial perspective and espionage. This brings us to the vital question? How easy is it to compromise an email account? Despite the… CONTINUE READING