Solved

Suspicious sign in to google

Posted on 2013-01-10
2
526 Views
Last Modified: 2013-01-11
Greetings --

I have a rather pedestian question, and a simple plea.  I just got two emails from google saying, "Someone recently tried to use an application to sign in to your Google Account ... We prevented the sign-in attempt in case this was a hijacker trying to access your account ... You should sign in to your account and reset your password immediately."

I will spare you the three paragraph explanation, but the bottom line is that I don't *want* to reset my password unless absolutely necessary.  Yet the email from google makes no mention of whether the hacker HAD the correct password.  My password is completely random and cannot be guessed.  If a hacker has it, s/he got it some other way, and with that kind of security leak my banking passwords aren't safe either.

Do you guys know anything about this?  Would google even be writing me if the password were incorrect?

Thanks.
0
Comment
Question by:NonComposMentis
2 Comments
 
LVL 3

Accepted Solution

by:
FeMaster earned 500 total points
ID: 38765719
Google sends out this warning when an attempt has been made to access your account from a never before seen location/IP address.  It could have even been you, if you accessed your Google account from a location you have never been.

I would assume that it was via a phone or tablet, as the email stated that someone tried to use and "application" to access your account.  It also states, "tried", so I believe you should be safe.

If you are really concerned, try out the site below.  It's been around for a while, and keeps tract of all the email and password combinations that have been publicly posted on the internet, by various hacking groups, that have compromised different website's databases, like Linked-in, eHarmony, Yahoo email, among tons of others.

Should I Change my Password?
0
 
LVL 82

Expert Comment

by:Dave Baldwin
ID: 38766095
There is no such thing as a password that can't be guessed by a computer.  Computers have infinite patience and will keep on guessing until they are told to stop.  There are unfortunately a large number of computers out there that have been set to this task.  Some are doing it because they have viruses running and some are just dedicated to the task.
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Why do we like using grid based layouts in website design? Let's look at the live examples of websites and compare them to grid based WordPress themes.
Check out this infographic on what you need to make a good email signature that will work perfectly for your organization.
The viewer will learn how to create and use a small PHP class to apply a watermark to an image. This video shows the viewer the setup for the PHP watermark as well as important coding language. Continue to Part 2 to learn the core code used in creat…
The viewer will get a basic understanding of what section 508 compliance can entail, learn about skip navigation links, alt text, transcripts, and font size controls.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now