Solved

Suspicious sign in to google

Posted on 2013-01-10
2
533 Views
Last Modified: 2013-01-11
Greetings --

I have a rather pedestian question, and a simple plea.  I just got two emails from google saying, "Someone recently tried to use an application to sign in to your Google Account ... We prevented the sign-in attempt in case this was a hijacker trying to access your account ... You should sign in to your account and reset your password immediately."

I will spare you the three paragraph explanation, but the bottom line is that I don't *want* to reset my password unless absolutely necessary.  Yet the email from google makes no mention of whether the hacker HAD the correct password.  My password is completely random and cannot be guessed.  If a hacker has it, s/he got it some other way, and with that kind of security leak my banking passwords aren't safe either.

Do you guys know anything about this?  Would google even be writing me if the password were incorrect?

Thanks.
0
Comment
Question by:NonComposMentis
2 Comments
 
LVL 3

Accepted Solution

by:
FeMaster earned 500 total points
ID: 38765719
Google sends out this warning when an attempt has been made to access your account from a never before seen location/IP address.  It could have even been you, if you accessed your Google account from a location you have never been.

I would assume that it was via a phone or tablet, as the email stated that someone tried to use and "application" to access your account.  It also states, "tried", so I believe you should be safe.

If you are really concerned, try out the site below.  It's been around for a while, and keeps tract of all the email and password combinations that have been publicly posted on the internet, by various hacking groups, that have compromised different website's databases, like Linked-in, eHarmony, Yahoo email, among tons of others.

Should I Change my Password?
0
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 38766095
There is no such thing as a password that can't be guessed by a computer.  Computers have infinite patience and will keep on guessing until they are told to stop.  There are unfortunately a large number of computers out there that have been set to this task.  Some are doing it because they have viruses running and some are just dedicated to the task.
0

Featured Post

3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

We are happy to announce a brand new addition to our line of acclaimed email signature management products – CodeTwo Email Signatures for Office 365.
Read this checklist to learn more about the 15 things you should never include in an email signature.
The viewer will learn how to create and use a small PHP class to apply a watermark to an image. This video shows the viewer the setup for the PHP watermark as well as important coding language. Continue to Part 2 to learn the core code used in creat…
Any person in technology especially those working for big companies should at least know about the basics of web accessibility. Believe it or not there are even laws in place that require businesses to provide such means for the disabled and aging p…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now