No matter how popular and easy to use an email platform like Gmail may be, having to actually go ahead and manage email on a day-to-day basis can be a daunting, dreadful task. Using extra email management tools that work with Gmail may not make you fall in love with email, but it will certainly help take some of the headache out of it by giving you back some of your precious time and energy.

Whether you use Gmail for personal or professional reasons, on the web or from a mobile device, all of the following tools may be of great benefit to you. Take a look to see which ones catch your eye.

Inbox by Gmail

Inbox by Gmail is basically a must-have if you regularly check your messages from your mobile device. Google took everything it new about how its users were using Gmail and came up with a brand new, super intuitive, highly visual email platform that simplifies and speeds up email.

Group incoming email messages in bundles for better organization, see highlights at a glance with card-like visuals, set reminders for tasks that need to be done later and "snooze" email messages so you can take care of them tomorrow, next week, or whenever you want. More »

Boomerang for Gmail

Photo © drmakkoy / Getty Images

Ever wish you could write an email now, but send it later? Instead of doing exactly that – leaving it as a draft and then trying to remember to send it at a specific time – just use Boomerang. Free users can schedule up to 10 emails per month (and more if you post about Boomerang on social media).

When you write a new email in Gmail with Boomerang installed, you can press the new "Send Later" button that appears next to the regular "Send" button, which allows you to quickly pick a time to send (tomorrow morning, tomorrow afternoon, etc.) or the opportunity to set an exact date and time to send it. More »


Photo © erhui1979 / Getty Images

Subscribe to too many email newsletters? Unroll.me not only allows you to unsubscribe from them in bulk, but also lets you create your own "rollup" of email newsletters, which brings you a daily digest of all the newsletter subscriptions you actually want to keep.

Unroll.me also has a nifty iOS app you can use to manage all your email subscriptions while you're on the go. If there's a particular subscription you want to keep in your inbox, just send it to your "Keep" section so Unroll.me doesn't touch it. More »


Photo © runeer / Getty Images

Do you communicate with a lot of new people via Gmail? If you do, sometimes it can feel eerily robotic when you don't know who's on the other end of the screen. Rapportive is one tool that offers a solution by connecting to LinkedIn so it can automatically match profiles based on the email address you're communicating with.


So when you send or receive a new message, you'll see a short LinkedIn profile summary in the righthand side of Gmail featuring their profile photo, location, current employer and more — but only if they have filled out that information on LinkedIn and have their account associated with that email address. It's potentially a nice way to put a face to an email message. More »


Photo © erhui1979 / Getty Images

Similar to Unroll.me, SaneBox is another Gmail tool that can help automate your organization of incoming messages. Instead of creating filters and folders yourself, SaneBox will analyze all of your messages and activity to understand which emails are important to you before moving all of the unimportant emails to a new folder called "SaneLater."

You can also move unimportant messages that still show up in your inbox to your SaneLater folder, and if something that gets filed into your SaneLater folder becomes important again, you can move it out of there. Even though SaneLater takes the manual work out of organization, you still have full control for those messages you need to specifically put somewhere. More »


Photo R?stem G?RLER / Getty Images

When it comes to online marketing, it's no question that email is still massively important. Many email marketers send messages all at once to hundreds or thousands of email addresses with the click of a button using third-partyemail marketing platforms like MailChimp or Aweber. The downside to this is that it's not very personal and can easily end up as spam.

LeadCooker can help you strike a balance between emailing lots of people and keeping it more personal. You still get a lot of the features of traditional email marketing platforms like automated follow-ups and tracking, but recipients won't see an unsubscribe link and your messages come straight from your Gmail address. Plans start at $1 per 100 emails with LeadCooker. More »

Sortd for Gmail

Stack of Papers
Photo © CSA-Archive / Getty Images

Sortd is an amazing tool that completely transforms the look of your Gmail account into something that looks and functions much more like a to-do list. With a UI that's as simple and as intuitive to use as Gmail itself, the aim of Sortd is to offer people who struggle to stay on top of email a better way to stay organized.

Sortd is the first "smart skin" for Gmail that divides your inbox into four main columns, with options to customize things the way you want. There are also apps available for both iOS and Android. Since it's currently in beta, the tool is totally free for now, so check it out while you can before pricing is put in place! More »

Giphy for Gmail

Animated GIF
Image made with Canva.com

Giphy is a popular search engine for GIFs. While you can certainly go straight to Giphy.com to search for a GIF to embed in a new Gmail message, a much easier and more convenient way to do it is by installing the Giphy for Gmail Chrome extension.

If you love using GIFs in Gmail, this is a must-have to help you save more time and compose your messages more efficiently. The reviews of this extension are pretty good overall, although some reviewers have expressed concern about bugs. The Giphy team seems to update the extension every so often, so if it doesn't work for you straight away, consider trying it again when a new version is available. More »

Ugly Email

Photo © ilyast / Getty Images

More email senders are now using tracking tools so they can get to know more about you without you even knowing it. They can typically see when you open their emails, if you clicked on any links inside, where you're opening/clicking from, and what device you're using. If you really value your privacy, you may want to consider taking advantage of Ugly Email to help you easily identify which Gmail messages that you receive are being tracked.

Ugly Email, which is a Chrome Extension, simply puts a little "evil eye" icon in front of the subject field of every tracked email. When you see that little evil eye, you can decide whether you want to open it, trash it, or maybe create a filter for future emails from that sender. More »

SignEasy for Gmail

Photo © carduus / Getty Images

Receiving documents as attachment in Gmail that need to be filled out and signed can be a real pain to work with. SignEasy simplifies the whole process by allowing you to easily fill out forms and sign documents without ever leaving your Gmail account.

A SignEasy option appears when you click to view the attachment in your browser. Once you've filled out the fields that need completion, the updated document is attached in the same email thread. More »

Source: This article was published lifewire.com By Elise Moreau

Categorized in Social

When you have limited time and resources, how do you choose which channel to focus on? Columnist Jordan Kasteler lays out the pros and cons of email marketing and social media to help you decide.

If you’re a busy professional with a digital company, you’ve likely lamented a thousand times over where to focus your limited resources. Email marketing and social media are two marketing tactics with a bundle of buzz, but which will give you the most efficient and effective results?

Email and social media are two completely different beasts and could serve two separate purposes in your overall strategy. To narrow your focus, we have to first get clear on what you’re after.


That said, keep in mind that it is not necessary to choose one or the other; each has its own place, and benefits and should be used in tandem to expand your business to new audiences and levels of success. But it’s always advantageous to have a core focus and know which modalities bring the most bang for your business buck.

Email marketing is a powerful mainstay

Email marketing is the little engine that could. It’s one of the only evergreen strategies that has worked since the web first landed.

This year, the number of worldwide email users will grow to over 3.7 billion, according to a 2017 report from The Radicati Group. By 2021, that number will climb to over 4.1 billion.

Gmail alone touts over 1 billion of those users.

When we compare this figure to the reach of social media, roughly 2.5 billion users, it is clear that email takes this round. According to Statista, social adoption will only increase to 2.95 billion by 2020 — still a far cry from email’s reach.

It’s this massive potential that has allowed email marketing and campaign management services like GetResponse to thrive and incorporate other powerful features like webinar solutions, custom landing pages and automation elements.

Additionally, one of the most significant benefits that email holds over social is that communications will reach their intended recipients about 90 percent of the time.

Email marketing, however, is not as easy as it seems.

First, the 3.7 billion email users are not all accessible the way they are on social media.

Moreover, email lists need to be carefully refined to only reach the most interested and qualified prospects; that means you can’t just buy a list of digital addresses and expect your email blasts to turn a profit; emails lists must primarily include people who actually want to hear from you.

Another downfall is that emails have to jump through a variety of hoops before safely landing in a person’s inbox. While most people will end up receiving your communications, poor email designs and content can cause messages to be labeled as spam. That takes all your efforts and tosses them into the digital trash bin. This is quite the double whammy when you consider the challenges associated with building an email list and gaining new subscribers.

For B2C emails, however, one of the biggest troubles is getting to know your audience well enough to tailor communications that will convert; companies need to understand their customers’ habits and tendencies in order to segment them properly and recommend relevant deals or products.

Additionally, B2C brands need to study their open rates to gain insights on the most beneficial times to send communications, so that a consumer is more likely to convert.

And for consumer-facing companies, in particular, email elements such as compelling copy, relevant calls to action, feature placement and the ever-imperative mobile optimization are critical challenges.

Without all these elements in place, the chances of recipients opening an email, clicking a contained link, and making a purchase from the web store are nil.

Social media has marketing superpowers

Social media has become a cultural phenomenon, evolving into a deep-rooted marketing necessity around the time that the Web 2.0 revolution began.

In that period, social media platforms have matured and transformed to become a marketer’s best friend.

All of the major players in the space now support hyper-targeted advertising, entertaining and dynamic content, massive reach capabilities and a variety of advertising channels for marketers to leverage. Most platforms also incorporate social selling opportunities like Facebook’s “shop” sections and Instagram’s shoppable posts.

These kinds of features allow businesses to seamlessly offer consumers products with unparalleled convenience.

Social media also helps propagate brand awareness in a way that has never been possible. Businesses can post blogs, updates, videos and other forms of content that users can then share with their friends, who share with their friends and so on.

This not only keeps consumers educated in real time but also pulls more prospects into marketing funnels by generating more awareness/interest, and even produces the potential for content to go viral.

As a natural byproduct, social media’s uploaded content and discoverability also tend to drive increased levels of traffic to websites, potentially leading to more conversions and higher rankings in the SERPs.

And did I mention that social media is 100 percent free to use? If you aren’t leveraging paid ads, that is.

But as you well know, there are some massive social pain points that must be considered.

Organic reach on social media has been declining at alarming rates over the past several years in accordance with various algorithm updates. Late last year, it was uncovered that publishers saw a 52 percent decrease in organic reach over the course of 2016.

Just three months later, The Wall Street Journal published a piece revealing that Facebook had come clean on miscalculating organic reach in the Page Insights dashboard:

…Facebook found that it had been over counting how many people were exposed to marketers’ organic posts, meaning regular posts that weren’t paid ads, because it was adding up the daily reach over certain periods without accounting for repeat visitors. The corrected metric on average will be about 33 percent lower for the seven-day period and 55 percent lower for the 28-day period…

But even if a brand’s posts are seen by the intended audience, it takes far more nurturing to turn social crowds into customers. This often equates to inflated expenditures relating to social ads, images, tools, content and other educational or sales-related materials.

And since 78 percent of consumers read reviews before buying, your brand’s page reviews had better be stellar if you have any hope of gaining a new customer.


Setting aside social media’s increasingly “pay to play” environment and other challenges, one of the final downsides to social is how businesses manage their social existence.

All too often, brands spread themselves far too thin by trying to participate on Facebook, Twitter, Instagram, Snapchat, Google+, Pinterest, Tumblr, LinkedIn and other popular networks. Without a refined strategy, it’s extremely easy to get lost in the digital noise.

Which channel should you use?

As far as B2C organizations are concerned, email is going to be a more beneficial and prosperous method for driving more sales and cultivating loyalty among consumers. Considering that emails will land in a customer’s inbox more times than not, it’s essential to study your audience and deliver more personalized messages, send communications at the right times and structure emails to allow for the most engagement and conversions possible.

While email is more fruitful for B2C, social still does a lot of heavy lifting in terms of generating awareness, website visits, increased email subscribers and brand loyalty as consumers continue to engage with a company.

If you can only do one, email is your champion. If you can do both, then you have a recipe for continually building, nurturing and converting leads in an exponentially powerful way.

Source: This article was published marketingland.com By Jordan Kasteler

Categorized in Social

Paladion’s John Daniele, at his firm’s cybersecurity monitoring centre in Oakville, Ont., says Canadian companies tend to lag their U.S. counterparts in spending on data security.
(J.P. Moczulski/The Globe and Mail)

That message from an Eastern European stranger who would like to make your acquaintance is obviously bogus.

So is that random PayPal notice. Yet the e-mail from a manager at your company, authorizing a money transfer, could just as easily be the work of criminals, too.

E-mail is still, and could very well remain, one of the most porous entry points for cybersecurity breaches, as evidenced in last week’s massive phishing hack targeting Gmail accounts. (Phishing is an attempt to gain sensitive information, such as passwords and credit card numbers, usually through e-mail inquiries.) Against a rat-a-tat machine-gun fire of constant hacking attempts, a defence that depends merely on employee vigilance not to open or act upon any seemingly questionable e-mail can seem hopelessly fallible.


“Just recently, I was dealing with a client who had about $200,000 transferred out of their account due to some criminal entity that was exploiting their business process,” said John Daniele, chief analyst of cyberintelligence and digital forensics at cybersecurity firm Paladion in Oakville, Ont.

The criminals had studied the business closely, determining which part of the process was vulnerable, “and they used a very sophisticated spear-phishing attack to exploit that,” he said. Spear phishing is a more targeted version of an e-mail ploy.

The problem is not only tricking a victim to click a link or give personal information. A hack can also be planted in a business process in which it is acted upon nearly automatically, faster than it can be confirmed.

“With the pace of business, that’s not always so easy. You may not be able to pick up a phone every single time and delay a business process that may be happening 100 times a day,” Mr. Daniele said. So, ideally, companies and organizations need to build a defence very specific to their unique operation.

Yet, he added, threats are so constant that “breaches are, in my view, inevitable, and many companies simply operate in a continuous state of breach.” Like wildfire, some breaches are simply left to burn.

“Some companies know that they are breached and decide not even to take the extra step to hunt for the attackers who are live on their network,” he said. It can be too costly, and Canadian businesses often spend less on cybersecurity than U.S. counterparts.

U.S. firms tend to set aside 2.5 to 5 per cent of their information technology budgets on security, “and I continuously see Canadian companies well under the 2.5 per cent,” Mr. Daniele said.

For many institutions, training users to detect suspicious messages and e-mail filters are their main defences. Yet, there are obvious limitations. Rather than just making the text of an e-mail look official, hackers are getting better at spoofing an e-mail’s point of origin, said Daniel Tobok, chief executive officer of Cytelligence in Toronto. Scammers can make an e-mail address look like it is legitimately from a vendor.

“The problem is that you can’t stop it fully because the bad guys are relying on the human factor. You’re dealing with psychology,” Mr. Tobok said.

Also, employees may wait to fess up whenever they think they might have clicked on something nefarious, but an immediate response is crucial. “Those five, 10, 30 minutes are critical to potentially contain whatever they clicked on,” Mr. Tobok said.

Phishing through e-mail is still the most pervasive way to breach a computer network, say security experts. Sometimes phishing may also lurk on websites, fooling users and implanting all manner of dangerous code from spyware to ransomware, but predominantly e-mail remains the main phishing spot.

There are automated processes, though, that institutions can apply. For instance, a system can be created to send any message to a sandbox, a location (usually remote servers, a.k.a. in the cloud) where a link or an attached file is automatically opened up to see if there’s anything wrong. Or it may test the link or file before the receiver even gets the e-mail, explained Danny Timmins, national cybersecurity leader at MNP in Mississauga.

This verification process can happen in seconds. Yet, it also needs to provide a safe way for users accessing the network from outside.

Training also can be more targeted. With clients, Mr. Timmins’s firm can simulate a focused phishing attack, trying hard to deceive users. If a few dozen users are fooled enough to click on a link, and some even provide their passwords or other personal information, the firm can then go back and provide more targeted education.

In particular, this can mean picking apart a company’s business process to find its weak links. “That’s often how wire frauds happen. Somebody has already phished them. They are already watching inside the network,” and then exploit how the company moves money or commercial data, Mr. Timmins said.

However, relying solely on education isn’t enough, experts warn.

“We’ve seen some very convincing e-mails which would even potentially fool a professional security consultant,” said Mr. Daniele at Paladion, noting that this also applies to websites hiding that they are controlled by dubious hosts. Detecting these dangers goes far beyond merely locating a secure site icon at the top of a Googled Web page.

“There is so much nuance involved that it’s a bit of an unrealistic expectation I think for security professionals to say, well, this is just a user problem, and a user simply needs to be better educated,” Mr. Daniele said.

“Security education and awareness is vitally important … but beyond that, there is a role for vendors [computer software and service companies] to produce secure software to ensure that they are doing right by their clients and consumers who are relying on the safety of that application,” he said.

Source: This article was published theglobeandmail.com By GUY DIXON

Categorized in Internet Privacy

If you’re a specialist in SEO or link acquisition, then you’ll know that generic email addresses are as much use as a chocolate fireguard when it comes to outreach.

You need to develop personal connections with influencers, regardless of whether you work in PR or SEO, it’s always the same.

But finding the right person’s email address can be a draining, time-consuming task.

Who has time for that?

Well, actually, it’s not so difficult, or time-consuming.

In this post, I’m going to walk you through the exact step-by-step process our agency uses to find (almost) anyone’s email address, in 60 seconds or less!


#1 – LinkedIn & Email Hunter

LinkedIn has to be one of my personal favorites for finding anyone’s email address.

According to a report by Statista, LinkedIn now has over 450 million members – an increase of 413 million since 2009.

Finding an email address with LinkedIn is easy – but it involves a two-pronged approach, so let’s start with the first step.

Simply head over to LinkedIn advanced search and enter the name of the company who your target works for.

You’ll then be provided with a list of relevant people who work there.

Depending on the size of the company, however, you may wish to include specific keywords or titles to narrow the search.

For example, if you’re searching for someone who works in the editorial department, make sure to include the title “editor”.

Below is an example, for illustrational purposes.

LinkedIn Advanced Search

Once we have some top-notch results, let’s move on to step 2.

If you want to fetch someone’s email address in a flash, then I’d recommend you sign up to Email Hunter and download their Chrome extension. It’s free up to 150 requests per month and integrates with LinkedIn.

Once you have clicked on the relevant person’s profile, a slick red button will appear next to their profile picture.

Email Hunter on Linkedin

Click this button, and VOILA.

Email Hunter email finder on LinkedIn

Piece of cake.

Email Hunter has a super high success rate and it works well for finding most corporate emails.

#2 – Followerwonk & Viola Norbert

If LinkedIn proves unsuccessful, then give Followerwonk and Viola Norbert a try!

Followerwonk is a Moz-owned Twitter tool that has lots of great features for marketers, although Moz recently announced they will no longer be investing in Followerwonk and they intend to find a good home for it, so we’re hopeful it will be here to stay!

A simple yet powerful feature of Followerwonk allows you to search keywords within Twitter bios, allowing you to quickly track down the person you’re looking for.

For this example, we’ll include the keyword “director” with the URL “goamplify.co.uk” to quickly find my profile.

Followerwonk Search Bio Feature

Then, once you have the full name of the person you need to speak to, copy and paste his/her name directly into Voila Norbert.

Voila is a powerful tool that pings the mail host to find and confirm the correct corporate email address, so it has high accuracy.

It’s not rocket science either, simply conduct a search, and you’ll be provided with the relevant email address.

Voila Norbert Email Search Feature

Once you sign up for a free account, you’ll get 50 free leads to play with.

#3 – Google Search Operators

Sometimes, we all like taking shortcuts.

And there’s nothing better than using Google search operators to help you easily find those ‘hard to find’ web pages and contact details.

Combining the target domain, name of the person, and specific keywords in search operators can work a treat.

Head over to Google and search one of the following examples…

site:companywebsite.com + “name” + contact

site:companywebsite.com + “name” + email

Should the relevant persons contact details be published on the domain, operator shortcut should instantly provide you the page you’re looking for, along with the contact information you need.

#4 – Mail Tester

If you have an email address, but you’re not 100% sure it’s correct, head over to Mailtester to see if it’s real.

Mailtester Email Validator

Mailtester usually gives a really good indication of whether it’s a valid email address.

But the tool is dependent on how the websites mail servers are set up.


On occasions, mail servers block email verification and it will be highlighted in yellow, in which case, you’re out of luck.

If it returns in red, that means the email doesn’t exist.

Most of the time, however, it’s green, so pop this in your bookmarks, and it’ll save you a bundle of time.

#5 – All My Tweets

All My Tweets allows you to crawl and display up to 3,200 recent Tweets from any profile, all within one page.

All My Tweets

When you search for your targets Twitter handle, use CTRL + F and search for the keyword “email” or “@examplesite.com.”

Twitter Search using All My Tweets

This saves you a great deal of time scrolling through their Twitter page to find the targets email address.

Simple stuff!

#6 – Pick up the phone

If you’re having a hard time finding an email address online, then you should pick up the phone and just ask.

If you have a direct phone number for the person you’re trying to reach, then great, but make sure you get off on the right foot by talking about something of value.

If you have a super amazing piece of content that’s relevant to their audience, or an outstanding product that will get them excited, then pick up the phone.

However, DON’T call if you don’t have a good reason to do so.

Put yourself in their shoes, would you be interested what YOU have to offer?

Hopefully, you did enough research before carrying out any outreach in the first place.

Wrapping it up

Hopefully, these simple yet powerful techniques will help you to find your target’s email in a flash, and will save you a great deal of time so you can focus on what matters – building relationships.


Have I missed any of your favorite email finding tools? If I have, feel free to share in the comments below!

This article was  published in searchenginejournal.com by Joshua Daniels

Categorized in How to

Early one Sunday morning, my editor, Yahoo Finance’s Erin Fuchs, checked her personal email and was surprised to find a message from PayPal (PYPL). The missive said she had recently changed her password, and asked her to call a phone number if that wasn’t the case.

It wasn’t, so Fuchs called. The email had come from a “This email address is being protected from spambots. You need JavaScript enabled to view it.” address and included a link to the PayPaypal website. However, she became suspicious when the person on the other end of the line asked for her credit card information to “verify her account.”

Phishing email.

It doesn’t matter who you are or what email service you use. If you have an email account, you’ve received some kind of scam, or phishing email, just like my editor.

Most of the time, these emails are relatively easy to spot. Some African prince or other wealthy individual wants to send you money until he can make it to the US. You just need to send your bank account information and Social Security number.


But criminals are quickly changing their tactics, firing off more sophisticated emails in an attempt to trick you into giving away your personal information. According to Gary Davis, chief consumer security evangelist at Intel (INTC) Security, in a recent study, more than 19,000 people were asked to look at 10 emails and identify which ones were scams. Only three percent of them were able to find all of the phony messages.

Worse still, some phishing messages contain ransomware, which locks down your entire computer until you pay the culprits a ransom.

Yes, it’s a scary world out there. But there’s hope. If you follow some of these quick tips, you’ll be able to stay one step ahead of the bad guys.

Read the subject line and sender’s address

Phishing emails are designed to sucker as many victims as possible. They cast a wide net by covering topics like banking and package deliveries—two things most people generally receive emails for.

You should be on high alert if you get a message from an unknown sender with a subject line mentioning changes to your bank account—or that you need to pick up a package that can’t be delivered—and you aren’t expecting either of those things. It’s probably a phishing attempt.

Just delete the message and move on with your life.


Hover over links

Okay, so you can’t remember if you changed your bank account info or aren’t sure if you have a package in the mail, so you open the email. That’s cool. As Intel Security’s Gary Davis explains, it’s rare that just opening a message executes any kind of code on your computer.

Phishing emails.

The message, however, tells you to click a link to check out the changes to your account or the status of your package. What do you do? Simple: Hover your mouse over the URL. When you point to a link without clicking, most web browsers and email programs automatically display the web address that link will open. If the email says it’s from your bank or delivery service, but the link points to a different site, don’t click it.

Urgency is suspect

A good number of phishing emails try to get you to act before you think—by adding a sense of urgency to their messages. An email telling you to log into or verify information for your bank or other account labeled “Final Warning” or “Urgent Notification” should set off warning bells right away.

Kevin Haley, director of product management for Symantec’s (SYMC) Security Response, explains that you should be suspicious if you receive an email with a URL or attachment that is trying to get you to click on something right away.

An scam email ordering you to do something immediately.

Russian agents are widely considered to have used this exact method to break into the Democratic National Committee’s server’s via a phishing email.So if you get a message telling you to do something instantly, ignore it. If you think it’s legitimately from your bank, skip the link and just go directly to your company’s website.

Hooked on phonics

As Microsoft points out in its phishing email primer, legitimate businesses hire professionals to ensure that communications with customers are mistake-free. Criminals? Not so much. So if you get an email that’s strangely formatted, and is loaded with enough grammar issues to drive your fifht-grade English teacher insane, delete it." data-reactid="66" style="margin: 0px 0px 1em;">The easiest way to identify a phishing email is if it’s loaded with grammatical or spelling errors. As Microsoft points out in its phishing email primer, legitimate businesses hire professionals to ensure that communications with customers are mistake-free. Criminals? Not so much. So if you get an email that’s strangely formatted, and is loaded with enough grammar issues to drive your fifht-grade English teacher insane, delete it.

Spam email with poor grammar.

Patience is a virtue

A lot of people fall victim to phishing emails because they’re simply in a rush. They’re in the middle of cooking dinner and taking care of two toddlers, see an email from their bank and BAM, that’s that. So how do you fix this? Just take a few minutes, breathe, and read your emails carefully. That’s pretty much it.

What to do when you’re hooked

So you’ve clicked a link or downloaded an attachment in a phishing email. You’re done for, right? Not exactly.

Both Davis and Haley suggest that if you realize you’ve been the victim of a phishing scheme and you’re fast enough, you can change your passwords on any affected websites before the criminals get access to your accounts. If you can’t do that, your best bet is to disconnect your computer from the internet and run an antivirus program.

Disconnecting your computer (like turning off WiFi) ensures that any malware you downloaded can’t communicate with its home server and steal your information; meanwhile, the antivirus program takes care of anything on your machine. You should also enable two-factor authentication on your accounts, which requires that you enter both your password and a second string of characters usually sent to your smartphone via text or an app, to keep people from accessing your information. 

If, however, you’ve given your private information to someone via email, well, your best bet is to use a credit-monitoring service to make sure that no one is opening credit-card accounts in your name.

Author: Daniel Howley
Source: https://www.yahoo.com/tech/how-to-avoid-falling-for-email-scams-174835308.html

Categorized in How to

Ever tried to do reverse email lookup? There may be many reasons for reverse email address search. With the tremendous growth in the number of internet users, curse like email abusing, spamming, stalking, etc. are also increasing simultaneously. And, it becomes quite important to find the person behind email address when you receive an email from an unknown sender.

The temptation to know “Whose email is this?” may lead you to reverse email lookup search on Google or other search engines. But the various search engines may help you only if the person has previously used that email address in his/her user profile on any social media, blog/website, public forum or any online community. In case, the unknown sender hasn’t used his email at any such places; your reverse email address search keeps hanging in the middle. Thus, it becomes quite difficult to find the person behind the email address.

Recently, I tried and tested various reverse email lookup tricks to find the person behind an email address. Also, we tested and analyzed many paid as well as free email finder tools that allow you to perform reverse email address search. Finally, we came up with this in-depth “Reverse Email Lookup Guide” to help you know whose email is this?

Reverse Email Lookup Tricks to Find Person Behind Email Address

If you’re a busy person, then you probably get a lot of Emails during the day. You probably get newsletters, Business Emails, News Alerts and so on. The majority of the time you get Emails from sources you know if you signed up for.  But, there will come a time when you will get an Email from someone you don’t know.

In that Email, it says all sorts of great things you’ve either won or can get something if you do this or that. Your first impulse is to respond and say you’ll do anything, but before you do, it would be a good idea if you investigated who the Email is from.


1. Discover Who Someone is by Using Their I.P Address

Not everyone has the same amount of knowledge, so not everyone will know what an I.P address is. I.P stands for Internet Protocol Address. It’s an exclusive address that identifies a device and something that is used by devices to talk to each other within the network.

You can use this I.P address to find a person because it’s like a street address or a phone number that someone uses. This kind of information is unique to each person, so you have a good chance of finding out who someone is by using it.

The I.P address is not in plain site, and you have to do some clicking to find it. Right beside the drop-down menu in the Email the other persons received, you will see an arrow pointing down.

How to find out who is behind an Email address - Whose Email is This - Reverse Email Lookup Tricks to Know Whose Email is This - Find Person Behind Email

Click on the drop-down menu and look for Show Original. You will see a lot of information that might confuse you but look for a sequence of numbers that look like this:

How to find someone IP Address - How to Know Whose Email Is This - Reverse Email Lookup Trick

Once you have the IP address, you need to use a tool such as Youngwatsignal or IPLocation. Thanks to these tools you can discover the country and the city the sender is from.

2. Do a Google Search to Know Whose Email is This

Doing a Google search is probably the first thing that crossed your mind to find out more information on someone, right? Why wouldn’t it be since whenever you want to know more about something the first thing you do is Google it.


You can do the same thing with an Email address you are suspicious about. Copy and paste the Email address in the Google search bar and see what information you get. If it’s an Email address that is or was being used in some type of scams, then you should be able to find some information on it.

3. Find Their Profile on Social Media Using Email

I mean, who doesn’t have a social media account these days, right? Whether you use it for work or personal use, everyone has one, and so does the person who Emailed you. That’s why searching for them on social media is a fantastic way you can get information about them.

How to search for someone on Social Media - Whose Email is This - Reverse Email Lookup Tricks to Know Whose Email is This - Find Person Behind Email

Since there are quite a few social media networks out there, you’d probably spend hours and hours looking for that person. Take the shortcut and use Knowem. It’s a very useful tool that by using a brand name, product, personal name or username. With this tool, you instantly search over 500 social media websites. Can you imagine yourself?

4. Use Facebook to Investigate Person Behind an Email

Whenever you want to search for someone on Facebook, you usually type in their name. But, in this case, you only have an Email to go on. So, the first thing you need to do is copy the mysterious Email address and then paste in Facebook’s search box.


If Facebook has a profile with that Email address, you will see it in the search results. It’s no secret that Facebook has billions of users so; you definitely have possibilities of finding who is behind the Email address by using Facebook.

If you hit the jackpot and found the person’s Email address, the first thing you need to do is download the profile picture. Some users (but not all) usually use the same picture for various social networks.

Now, upload that same profile picture onto Google Images and then click on the camera icon that is right beside the search box. What this is going to do is that it is going to show you if that person uses that same picture somewhere else. If so, you won’t just have their Facebook profile to get to know them better, but the other accounts you also found.

5. People Search Tools for Reverse Email Lookup

There are people search tools out there for reverse email lookup that can make the searching a lot easier. Those reverse email lookup tools will do a comprehensive search in places you probably didn’t even know existed. For example, you have Pipl and Spokeo. These tools allow you to perform a reverse Email lookup and get you the information you need.

They are both useful tools, but I have to admit that Spokeo features a more comprehensive database. Spokeo searches for web documents, but it also looks through social networks and whois information of domains.

It will look for any information that is related to the Email you entered. It doesn’t matter how small that info is, if it’s related to the Email, it will uncover it.

Keep in mind that there may be some information that only subscribed users can have access to. If you need to know who this person is, you will need to subscribe.

Another great tool is Email Sherlock, just like the other two reverse email lookup tools, you can enter Gmail, Yahoo, Hotmail or even a custom domain Email ID. Which one is the best out of the three? If you want to use the tool for reverse email lookup that gives you the most amount of information, then Email Sherlock is a perfect choice.

Email Sherlock does something that the other two reverse email lookup tools don’t. It will send an Email to the ID you are investigating that someone is doing a reverse image search notifying them that someone is investigating them.

6. Use Rapportive to Know Person Behind an Email

Rapportive is a tool that will give you the information you need, and it is very easy to use. I should begin by mentioning that it’s a service that will only work for Gmail.

Whose Email is This - Reverse Email Lookup Tricks to Know Whose Email is This - Find Person Behind Email

If you usually get Emails from people you don’t know, you might want to keep an extension like Rapportive in your browser. So the next time you get another one of those Email, you can instantly get information on the sender.


This Gmail tool will get you LinkedIn profiles right inside your Gmail account. Just open the Email, and to the right, you will see all the LinkedIn information about the person who sent the Email. You will also see shared connection, where they are, and you even get to see a picture. If you use either Chrome or Firefox, this is a reverse email lookup tool you can enjoy.

7. Be Careful with Phishing Scams

Last but not least, you need to know how to identify a phishing scam. It’s not always an honest person that is behind the Email address. Unfortunately, the Email you received could be a phishing scam. So, how to know that this is what’s behind the Email you received?

You can tell that it’s a phishing scam if the Email you received is from a financial institution. If the Email is asking you to confirm your personal information or even your pin number, then erase it!  There is a 99.9% chance that you received a phishing scam Email.

Finding out who is behind these kinds of Email is more complicated, and I don’t know if you want to get into that kind of thing. I would just recommend you erase it and always be careful as to what Emails you respond to.

How to Know Whose Email is This?

There are many ways you can investigate someone and find the person behind an email, thanks to the Internet. Unless the person who sends the Email is some professional at hiding, there is a good chance that you are going to find at least a little bit of information on the sender.

Do you get a lot of mysterious Emails? Which reverse email lookup trick you use to find someone behind that email? Let us know in the comments.

Author: Rahul Dubey
Source: https://techreviewpro.com/reverse-email-lookup-tricks/


Categorized in Search Techniques

Mention spam and the first thought in your head might be of those unwanted emails promising easy money and get rich quick schemes that cram your inbox. But what you might not know is that another kind of spamming can have detrimental effects to your small business’s online presence too. That’s even if you never press the send button for an email titled “Make $1000 an hour just for filling out reports.”

Case in point is the recent failed suit against Google filed because websites belonging to online marketing firm e-ventures Worldwide were delisted by the search engine giant for search engine spamming.

What is Spamming?

In layman’s terms, spamming can be defined as the flooding of the Internet with unsolicited or misguiding messages. Mostly, spam is used for commercial advertising, often for get-rich-quick schemes or for selling dubious products. But not always.

In the end the term describes the aggressive means to promote the product rather than the product itself. So don’t make the mistake of believing that just because the product you are marketing is legitimate you couldn’t be guilty of spamming.

The most common form of spamming is email spamming, true. But the one likely to damage your business’s online presence the most is search engine spamming.

Search engine spamming is the deliberate and dishonest practice of modifying HTML pages to increase the chance of having them placed among the top search engine results.

Generally, most search engine spammers are aware that the content they are promoting is not relevant or useful to internet users. Or at least they are aware the means they are using to get it to the top of the search engine rankings is deceptive.

What Are the Common Search Engine Spamming Techniques?

Keyword Stuffing

This is the repeated use of a word to increase its frequency on a page. Older versions of indexing programs simply counted the number of times a keyword appeared on text and they would use that to determine the relevance level. However, things have changed as modern search engines have the ability to tell if a keyword is above its “normal” use.

Meta Tag Stuffing

This includes using keywords that are not related to the website content as well as repeating some more than once.

Mirror Websites

This is the hosting of multiple websites with different URL’s but the same or very similar content.

Hidden Links

This involves hiding links where visitors can’t see them so as to increase link popularity.

Page Redirects

This refers to the practice of taking the user to another page without their intervention using either CGI scripts, Java, JavaScript, META refresh tags or Server side redirects.

Gateway or Doorway Pages

These are low-quality web-pages that are stuffed with keywords and phrases but very little content. A doorway page will generally have “click here to enter” in the middle of the text.



This is the technique of sending a different version of  a webpage to the search engine from the one your visitors see.

Link Spamming

This type of spamming mostly takes advantage of Google’s PageRank algorithm. The algorithm gives a higher rank to a website that has more websites linking to it. So a spammer might create multiple websites with different URLs that link to one another.

Code Swapping

This involves optimizing a page for top ranking, then swapping another page in its place once a top ranking is achieved.

What Are the other Types of Spamming?

Email Spamming

This is the practice of sending unsolicited email messages to an indiscriminate set of recipients. It is among the earliest forms of online spamming and it is estimated that email spam currently makes up 80 to 85 percent of all emails in the world. While this vice is illegal in some jurisdictions, it is far less regulated in others.

Social Network Spamming

Social sites such as Twitter and Facebook are not immune to spam messages either. There have been numerous cases of account hacks and sending of false requests and links under the guise of the account holder’s details.

Mobile Phone Spamming

This form of spamming is directed at the text messaging service of a mobile phone and it is quite irritating and may in some markets cause the user to be charged for every text message received.

While spamming, especially search engine spamming, might make sense to some shrewd advertisers, it is important to note that the effects can be dire and at times even lead to jail time as in the case of “spam king” Stanford Wallace.

So for your sake and that of your business’ run away from temptations to market even legitimate products or your web presence by deceptive means. You may damage your online reputation irreparably — or worse.

Author : Antony Maina

Source : https://smallbiztrends.com/2017/02/what-is-spamming.html

Categorized in Internet Privacy

It's easy to think you can spot a scam email, with all the talk about spelling mistakes, "too good to be true" offers, and strange web addresses. But scammers have come a very long way.

"It's rare to see poor spelling and grammar now, because these scammers are using original logos and content and only using a small part to take you to their own URL," said Craig McDonald, head of cybersecurity firm Mailguard.

"They know what people are looking out for. They're doing what marketers are doing with A/B testing, sending two versions and seeing which one performs better."

Mary Julian, a retiree from Glebe, recently received an email from the "Department of Human Services" about a subsidy benefit and an another from "AGL" regarding an $834 electricity bill. They both appeared genuine.

"But I thought I'd check, and I pasted the subject line 'Your 2016 subsidy benefit' into the search engine, and there were all these scam warnings and I got the shock of my life," she said.

"With the AGL email, I was with EnergyAustralia and presumed they had merged, so I rang to double check and that's when I found I had nearly been conned."


At least $37.5 million was swindled by fraudsters using online scam methods in 2015 - and that's just based on 41,000 reports that year to the Australian Competition and Consumer Commission.

With this in mind, take Fairfax Media's test and see if you can spot the scam. Answers are at the bottom.


Real or fake? Email from energy provider AGL.Real or fake? Email from energy provider AGL. Photo: Supplied

This scam uses a fake AGL energy bill that infects computers with "ransomware" and holds them hostage. Tens of thousands are believed to have fallen victim last year.

The energy company issued a warning last June, saying it would never send an email asking for personal banking or financial details.

"Instead of downloading an invoice you are downloading a virus that logs everything you type on your computer keyboard and encrypts files," says Raymond Schippers from Check Point.


Real or fake? Confirmation email from Ticketek.Real or fake? Confirmation email from Ticketek. Photo: Supplied

Last year, many Australians received a fake confirmation email from "Ticketek" with a link to print tickets. Those who took the bait instead downloaded malware.


"A common subject line is 'Thank you for buying coupon on Ticketek'," says the Australian Communications and Media Authority.

"The emails are linking to fake websites which contain the word 'ticketek' to make the website appear legitimate."

Australian Tax Office

Real of fake? Email from the Australian Tax Office.Real of fake? Email from the Australian Tax Office. Photo: Supplied

During peak periods, the ATO receives more than 750 scam reports a day. While phone scams have declined, fraudulent emails are on the rise.

This one with the subject line "Your next activity statement" may affect small to medium businesses who regularly lodge BAS forms with the ATO.

"Some scam emails can look very convincing. Some even have privacy warnings and other text to make them look more real," says ATO's assistant commissioner Graham Whyte.

Commonwealth Bank

Real or fake? Commonwealth Bank's internet banking sign in webpage.Real or fake? Commonwealth Bank's internet banking sign in webpage. Photo: Supplied

There are many different types of CBA-branded scams. Remember, the bank never sends emails requesting customers to confirm, update or disclose confidential banking information.

On Friday, May 13, last year there was a "fast-breaking", "large-scale" email scam that used the subject line: "You've a new statement". A link transported users to a fake Netbank login portal.

"The spammers were able to gain control of a government level domain name and add their own records, which is called 'domain shadowing'," says Mailguard.

Australia Post

Real or fake? Email from Australia Post.Real or fake? Email from Australia Post. Photo: Supplied

In the era of online shopping, it may not seem strange to receive a delivery email from Australia Post. But there are plenty of hoax emails going around.

"Do not click or paste the link in your browser and delete the email immediately. If you are expecting a parcel and are unsure of an email you may have received, please go to the Australia Post [website] or our app to track your delivery," it says.

This email scam uses various popular company names to look pass off as real, including ASOS, David Jones, JB Hi Fi and Terry White.


Real or fake? Netflix's log in webpage.Real or fake? Netflix's log in webpage. Photo: Supplied

Earlier this year, Australian Netflix users were urged to delete a "Membership on hold" email that led to a website that could dynamically change.


Once the user signed in and filled in the empty boxes, the website would identify your financial institution based on the credit card number, and then accordingly ask for additional authentication by, for example, using "MasterCard SecureCode" or "Verify with Visa" boxes.

"If a particular bank asks for additional security information, it will determine that based on your credit card details and the form will change. It's a very clever website," says Bruce Matthews, a cybersecurity expert at the ACMA.


Real or fake? Email from Paypal.Real or fake? Email from Paypal. Photo: Supplied

A simple (but not foolproof) way to check whether a PayPal email is real is to remember the company always addresses you by your full name.

Fake emails tend to use "Dear Paypal member". Also, try to hover your mouse over a link to see the destination web address.

"If unsure, forward the suspicious email to This email address is being protected from spambots. You need JavaScript enabled to view it. and we'll let you know if it's really coming from us or not," PayPal says.

Federal Circuit Court of Australia

Real or fake? An email from the Federal Circuit Court of Australia.Real or fake? An email from the Federal Circuit Court of Australia. Photo: Supplied

bogus "You've been subpoenaed" email hit inboxes across Australia last year, scaring a lot of people.

It purported to subpoena the recipient to attend court at a specific time and asked them to click on a link to both the court address and case-related information.

"Neither the Federal Court nor the Federal Circuit Court issue subpoenas in such an informal way," a spokesman says.


  • AGL - Right a fake
  • Ticketek - Right a fake
  • Australian Tax Office - Fake
  • Commonwealth Bank - Left a fake
  • Australia Post - Both are fake
  • Netflix - Left a fake
  • PayPal - Top a fake
  • Federal Circuit Court - Fake

Top 10 tips to protect yourself

  • Watch out - scammers target you anytime, anywhere, anyhow
  • Don't respond - ignore suspicious emails, letters, house visits, phones calls or SMS messages
  • Don't immediately agree to an offer - do your research and seek independent advice
  • Ask yourself who you're really dealing with - scammers tend to pose as those you trust

  • Don't let scammers push your buttons - scammers will play on your emotions
  • Keep your computer secure - update your firewall, anti-virus and anti-spyware software
  • Use a secure payment service - look for a URL starting with 'https' and a closed padlock symbol
  • Never send money to someone you don't know and trust - it's rare to recover money
  • Protect your identity - your personal details are private and invaluable
  • Spread the word - if you've spotted a scam, report it to www.scamwatch.gov.au

Author : Esther Han

Source : http://www.canberratimes.com.au/business/consumer-affairs/phishing-emails-and-other-online-scams-on-the-rise-as-australians-lose-millions-of-dollars-20161115-gspnar.html

Categorized in Internet Privacy

Gmail Supports a plethora of search operators to help you instantly find that elusive email message buried in your mailbox. You have size search – like larger_than:5mb – to find the big messages in your account. File search – like has:attachment filename:doc – will locate email messages that contain file attachments of specific types. This graphic illustrates all the known search operators that work both on Gmail and Google Inbox.

Date Search in Gmail

Date search in Gmail helps you locate emails sent or received in a specific period. Here are some examples:

  • newer_than:7d from:me – Emails sent in the last 7 days
  • after:2016/12/01 to:me – Emails received in the month of December 2016

Specify Time Modifiers in Gmail Search

Gmail also supports time-based searches allowing you to find emails in the specific hour, minute or second. For instance, you can limit your Gmail search to emails that were received between Dec 10 8:15 PM and Dec 10, 2016 8:45 PM.

To get started, convert the date and time to Epoch time and then use the timestamp with the standard after or before search operator of Gmail.

For instance, the Epoch time for Dec 10, 2016 8:15 PM is 1481381100 and the Epoch time for Dec 10, 2016 8:45 PM is 1481382900. Use the search query after:1481381100 before:1481382900 and you’ll get a list of all emails received during that 30-minute period.

Epoch time is the number of seconds that have elapsed since January 1, 1970 (UTC). Use the Epoch converter to represent a human readable date and time in Epoch and use that timestamp with the before or after search operator of Gmail to find that elusive email.

Author:  Amit Agarwal

Source:  http://www.labnol.org/internet/gmail-search-tips/29206/

Categorized in Online Research

Do you still have a Yahoo Mail account? The tech company made its way onto the scene in 1994 and became a popular search engine and email service. However, it's had a very rough year.

First we learned of a massive data breach that could have impacted billions of users. Then we found out Yahoo was allegedly complying with a government security agency's request to spy on all incoming emails. Now, there is more troubling news coming out about the tech giant.

Security researcher Jouko Pynnonen recently discovered a severe security vulnerability with Yahoo Mail. The flaw would allow an attacker to access the victim's email account.

This was a cross-site scripting (XSS) attack, similar to the one discovered by Pynnonen around the same time last year. Watch this video to see a brief detail of last year's discovery:

Why this flaw is so alarming

What's terrifying about this is the victim wouldn't even need to click on a malicious link to be affected. You only had to view an email sent by the scammer for your Yahoo Mail account to be compromised.

Yahoo filters HTML messages, which is supposed to keep malicious code from making its way into a user's inbox. However, Pynnonen discovered a vulnerability that kept the filters from catching all malicious code. It had to do with different types of attachments that could be added to emails.

The good news is once Pynnonen reported the flaw, Yahoo fixed it. The tech giant also paid him $10,000 for discovering the vulnerability through its Bug Bounty Program.

Even though these flaws have been patched, it's been a rough stretch for Yahoo. If all of these problems worry you, you might want to close your Yahoo accounts. Here are instructions on how to do that:

  • How to close your Yahoo account:
  • Go to the "Terminating your Yahoo account" page.
  • Read the information under "Before continuing, please consider the following information."
  • Confirm your password - if you forgot your password, you can recover it with the Yahoo Sign-in Helper.
  • Click Terminate this Account.

Remember, if you do close your Yahoo account, you will not be able to use services associated with it. So if you decide to keep your account, at the very least make sure you have a strong password. Here are three proven formulas for creating hack-proof passwords.

You can also enable two-step verification, set up a Yahoo Account Key, or use a password manager. It's always better to be safe than sorry!

Author:  Mark Jones

Source:  http://www.komando.com/

Categorized in Internet Privacy
Page 2 of 3


Association of Internet Research Specialists is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.

Follow Us on Social Media