<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>GMail Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/gmail/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/gmail/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Fri, 06 Jul 2018 09:51:40 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>GMail Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/gmail/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Who&#8217;s been reading your Gmail?</title>
		<link>https://www.l2cybersecurity.com/whos-been-reading-your-gmail/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 06 Jul 2018 09:51:40 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GMail]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1242</guid>

					<description><![CDATA[<p>For a long time the answer to the question &#8220;Who&#8217;s been reading your Gmail?&#8221; has been Google&#8217;s advertising algorithms. They stated that they have stopped doing that last year. However the ability, by others, to continue to read your e-mail remains, and you may have given some other company access to do so without being&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/whos-been-reading-your-gmail/">Who&#8217;s been reading your Gmail?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft wp-image-1243 size-thumbnail" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/look-over-shoulder-150x150.jpg" alt="Who's been reading your Gmail" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/07/look-over-shoulder-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/07/look-over-shoulder.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />For a long time the answer to the question &#8220;Who&#8217;s been reading your Gmail?&#8221; has been Google&#8217;s advertising algorithms. They stated that <a href="https://blog.google/products/gmail/g-suite-gains-traction-in-the-enterprise-g-suites-gmail-and-consumer-gmail-to-more-closely-align/">they have stopped doing that last year</a>. However the ability, by others, to continue to read your e-mail remains, and you may have given some other company access to do so without being fully aware of it.<span id="more-1242"></span></p>
<p>I have covered this area before, where I talked about <a href="https://www.l2cybersecurity.com/permission-to-spy/">Mobile App permissions</a>. It&#8217;s pretty easy to see what permissions a Mobile App is looking for and to make an educated decision about whether it should receive those permissions by you.</p>
<p>In this newly revealed situation, some third-party developers, who create add-on apps for your e-mail may have actually had real people reading your e-mail. <span id="c103" class="notranslate">?</span></p>
<p>The apps in question are usually performing some useful function, like monitoring your mailbox for meeting invitations and then suggesting appropriate times for the meeting. Or itinerary/travel planning apps that look for flight/hotel booking e-mails and then package them up into a useful, coordinated scheduling pack.</p>
<p>According to <a href="https://nakedsecurity.sophos.com/2018/07/04/someone-else-is-reading-your-gmails/">this Sophos report</a>, when you install these (usually free) add-ons:</p>
<blockquote><p>Users had to agree to share that information first, granting explicit permission for an app to access your Gmail account or your broader Google account. However, what users may not have known is that this doesn’t only give the third party company’s software access to your email. It gives developers inside those companies the ability to manually access them too.</p></blockquote>
<p>And as is also reported in that Sophos report, one of the companies did admit to allowing their staff to actually read people&#8217;s e-mails, supposedly to include new features that people might find useful. However what&#8217;s at play here is that most people weren&#8217;t aware that their actual e-mails are being read by another actual human.</p>
<p>Most people, myself included, went &#8220;Meh!&#8221; when we heard that Google&#8217;s advertising algorithms were scanning our e-mail content, because it is some non-human thing that is looking at the cold hard data.</p>
<p>However, the notion that another actual human may have been reading sensitive, private discussions in an e-mail chain would be quite concerning to most people and rightfully so.</p>
<h4>How can you find out who&#8217;s been reading your Gmail?</h4>
<p>Well you might not be able to find out if they have read your e-mail, but there&#8217;s something really easy you can do to find out what apps have got access to your Gmail.</p>
<p>Check the <a href="https://myaccount.google.com/permissions">apps with access to your account</a> page for your Google account and review any apps you have there. I&#8217;ve just done it and found there was an app that I previously used to look at Google Analytics, but have since stopped using and uninstalled. However the app developers still would have had permission to access any Google Analytics data I had (which I don&#8217;t any more as I have stopped using that too). I simply clicked on the app and removed it&#8217;s access. It&#8217;s that simple.</p>
<p>If you do have these apps that can enable somebody to read your Gmail, you need to consider a couple of things:</p>
<ol>
<li>If this is your business e-mail account, have you considered the #GDPR aspects of giving an external third party access to view personal data? You will need to have a Data Processing Agreement in place with the third party and also declare their access to the individuals whose personal data you process.</li>
<li>If this is your personal e-mail account, then you have got to make the determination if the app is so useful to you that you are happy to allow some developer, somewhere in the world read your e-mail.</li>
</ol>
<p>For me privacy wins out every time.</p>
<p>Let&#8217;s be careful out there!</p>
<p>The post <a href="https://www.l2cybersecurity.com/whos-been-reading-your-gmail/">Who&#8217;s been reading your Gmail?</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sneaky Tax Refund e-mails</title>
		<link>https://www.l2cybersecurity.com/sneaky-tax-refund-e-mails/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 01 Feb 2018 09:55:55 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[GMail]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1139</guid>

					<description><![CDATA[<p>Tax refund scam e-mails are nothing new. They&#8217;ve been doing the rounds for many many years at this stage. Like the &#8220;Nigerian Prince&#8221; scams, that are enjoying a resurgence presently, the tax refund scams might catch out those who are new to the internet and may not have heard of such scams before. It is&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sneaky-tax-refund-e-mails/">Sneaky Tax Refund e-mails</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1141" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/tax-refund-phishing-150x150.jpg" alt="Tax refund scam" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/tax-refund-phishing-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/tax-refund-phishing.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />Tax refund scam e-mails are nothing new. They&#8217;ve been doing the rounds for many many years at this stage. Like the &#8220;Nigerian Prince&#8221; scams, that are enjoying a resurgence presently, the tax refund scams might catch out those who are new to the internet and may not have heard of such scams before.<span id="more-1139"></span></p>
<p>It is tax season in the US at the moment and there are a lot of scams going on, which the <a href="https://www.irs.gov/newsroom/tax-scams-consumer-alerts">IRS do warn people about</a>. This one caught my attention because it was a simple attempt to steal e-mail account credentials. Apparently there have been some changes made to the US tax code, which people are aware of but may not fully understand them, which may be enough to cause somebody to fall for this scam.</p>
<p>What happens is the victim receives an e-mail with the subject of &#8220;Federal Tax Refund Information&#8221;.</p>
<p>This e-mail then says &#8220;Good afternoon, I have a very important information for you concerning the Federal Tax Refund which I know that it will help you. Kindly check the attached file to view the details.&#8221; For those of you unfamiliar with <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>, you might be tempted to open the attachment.</p>
<p>The PDF that is attached, when opened, simply contains what looks like a link to a Google Drive document.</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-1142 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-08-40.png" alt="Tax refund scam google drive link" width="639" height="564" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-08-40.png 639w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-08-40-300x265.png 300w" sizes="(max-width: 639px) 100vw, 639px" /></p>
<p>Which of course you want to look at because, money! There is also a sense of urgency introduced by saying the tax refund document is only stored for 14 days. While this is a fairly lengthy period by phishing standards, it still sows a sense of haste.</p>
<p>Clicking on the link, brings you to a website that looks an awful lot like a Google Docs sign-in page which, if you are not paying attention, might cause you to give away your Gmail account name and password. I refer, of course, to not paying attention in regards to the address of the sign-in page, which is circled in <span style="color: #ff0000;">red</span>:</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1143 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-05-54.png" alt="Tax refund scam google drive sign-in" width="616" height="536" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-05-54.png 616w, https://www.l2cybersecurity.com/wp-content/uploads/2018/02/Screenshot_2018-01-25_17-05-54-300x261.png 300w" sizes="auto, (max-width: 616px) 100vw, 616px" /></p>
<p>That is not &#8220;https://accounts.google.com&#8221; which would be what you are would normally expect. Of course if a genuine account and password is provided, then the evil doers will now take full control over the e-mail account and use it for nefarious purposes, UNLESS of course you had followed <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">Commandment 7</a> and used two-factor authentication. If you had, you could then laugh at the bad guys attempting to login as you and failing because of this brilliant protection mechanism.</p>
<p>Then you calmly go ahead and change that password in ALL accounts that you used it in, because it&#8217;s now compromised.</p>
<p>While this has been relating to the US tax season, expect similar carry-on during October in Ireland.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sneaky-tax-refund-e-mails/">Sneaky Tax Refund e-mails</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Take a 2-Minute Privacy check-up.</title>
		<link>https://www.l2cybersecurity.com/take-2-minute-privacy-check/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 12 May 2017 15:47:08 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[GMail]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Twitter]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=649</guid>

					<description><![CDATA[<p>After last week&#8217;s brief shenanigans with GMail getting phished badly and the recommendation I made about how to help correct and protect yourself from that nasty piece of work, I went ahead and did something I had not done in some time. A privacy check-up and there is also a security or account check-up available too.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/take-2-minute-privacy-check/">Take a 2-Minute Privacy check-up.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="wp-image-650 size-thumbnail alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/2-Minute-Privacy-150x150.jpg" alt="2 Minute Privacy Check-up" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/2-Minute-Privacy-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/2-Minute-Privacy.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />After last week&#8217;s brief shenanigans with <a href="http://www.l2cybersecurity.com/gmail-users-phished/">GMail getting phished badly</a> and the recommendation I made about how to help correct and protect yourself from that nasty piece of work, I went ahead and did something I had not done in some time. A privacy check-up and there is also a security or account check-up available too.<span id="more-649"></span></p>
<p>Most of the big on-line services have this facility buried in their settings somewhere, but when you find them, they are really easy to go through and it can be an eye-opening exercise. I discovered on my personal GMail account, that a phone I had on loan while my own was off getting repaired was still an authorised device on my account. I wasn&#8217;t too concerned, because I myself had carried out a factory reset on that phone before I handed the loaner back in.</p>
<p>However, most people would not think to do such a thing and, while you would expect the repair shop to do it as part of their procedures, this does not necessarily make it happen &#8230; and I&#8217;m not talking about the small phone repair shops that are dotted about the place either. A friend got a loaner phone from one of the big mobile companies while her&#8217;s was sent for repair. She took a few photos one day and was browsing them that evening and she came across a few dozen photos of some people she did not recognise. She mentioned this to the shop when she collected her repaired phone. They apologised profusely, immediately did a factory reset on the loaner and showed her the completely empty device when it restarted. That was OK for her. But what about the previous user of the device. What if she knew even one of the people in those photos? What if the photos were embarrassing or worse &#8230; incriminating? <img decoding="async" src="https://www.facebook.com/images/emoji.php/v8/f15/1/28/1f914.png" alt="?" /></p>
<p>Anyway, I&#8217;ve done a Billy Connolly and wandered wildly off-topic, so back to privacy check-ups.</p>
<p>You can do these all at once, if you want, or just take 2 minutes each day over the next few days and do a privacy check-up and security/account check-up on each account. I would also recommend you do this on a desktop/laptop, as the mobile apps may not have the full set of privacy settings to be checked. Finally don&#8217;t just be looking for authorised devices, keep an eye out for Apps which are authorised on your accounts, which you may no longer use. You should really remove their access.</p>
<p>GMail &#8230; has both privacy <a href="https://myaccount.google.com/privacy">https://myaccount.google.com/privacy</a> and security <a href="https://myaccount.google.com/security">https://myaccount.google.com/security</a> check-ups</p>
<p>LinkedIn &#8230; has privacy <a href="https://www.linkedin.com/psettings/privacy">https://www.linkedin.com/psettings/privacy</a> and account <a href="https://www.linkedin.com/psettings/account">https://www.linkedin.com/psettings/account</a> settings pages.</p>
<p>FaceBook &#8230; privacy <a href="https://www.facebook.com/settings?tab=privacy">https://www.facebook.com/settings?tab=privacy</a> and security <a href="https://www.facebook.com/settings?tab=security">https://www.facebook.com/settings?tab=security</a></p>
<p>Twitter &#8230; Privacy <a href="https://twitter.com/settings/safety">https://twitter.com/settings/safety</a> and account <a href="https://twitter.com/settings/account">https://twitter.com/settings/account</a> settings</p>
<p>Other online services that you use might have something similar. Just go into their settings and search for privacy and account or security tabs and simply go through each of them.</p>
<p>You might even pop a reminder into your calendar to come back in 6 months time and review these settings again because lets face it, something will have changed.</p>
<p>And hey &#8230; Let&#8217;s be careful out there.</p>
<p>The post <a href="https://www.l2cybersecurity.com/take-2-minute-privacy-check/">Take a 2-Minute Privacy check-up.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>GMail had a bad case of the phishers.</title>
		<link>https://www.l2cybersecurity.com/gmail-users-phished/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 08 May 2017 22:46:09 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[GMail]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Spam]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=639</guid>

					<description><![CDATA[<p>About 1 million GMail users were subject to a very clever phishing campaign last week. &#8220;What&#8217;s phishing?&#8221; I hear you ask. It&#8217;s basically an e-mail that persuades you to take an action, which ends up compromising you in some way. In this case, you receive an e-mail with an apparent Google Docs attachment. If you follow&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gmail-users-phished/">GMail had a bad case of the phishers.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-thumbnail wp-image-640 alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-AntiSpam-FDG-150x150.jpg" alt="GMail base case of the spammers" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-AntiSpam-FDG-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-AntiSpam-FDG.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />About 1 million GMail users were subject to a very clever phishing campaign last week. &#8220;What&#8217;s phishing?&#8221; I hear you ask. It&#8217;s basically an e-mail that persuades you to take an action, which ends up compromising you in some way. In this case, you receive an e-mail with an apparent Google Docs attachment. If you follow through with it, all of your e-mail contacts will receive the same phishing e-mail, but coming from you.</p>
<p><span id="more-639"></span>Fortunately there was nothing destructive in this phishing campaign, but it did cause quite a lot of consternation because it could have been very nasty. It was quite clever in how it fooled it&#8217;s victims.</p>
<p>What the evil doers did was to create an app called &#8220;Google Docs&#8221; &#8230; not to be confused with the official one from Google called &#8230; errrrr &#8230; &#8220;Google Docs&#8221; ?.</p>
<p>They then sent out their phishing e-mail, which looked like this:</p>
<p><img loading="lazy" decoding="async" class="wp-image-644 size-full aligncenter" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-Phish-1.jpg" alt="" width="700" height="208" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-Phish-1.jpg 700w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/Gmail-Phish-1-300x89.jpg 300w" sizes="auto, (max-width: 700px) 100vw, 700px" /></p>
<p>In later occurrences of the phishing campaign, the blurred out name in the image above, was probably somebody you know or at least you were on their contact list. If you click on the &#8220;Open in Docs&#8221; button above, you launch the app called &#8220;Google Docs&#8221;, which sounds like the right kind of thing to happen &#8211; right? Then you get the following pop-up, which looks fairly legitimate, because it is:</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-643 aligncenter" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/GMail-Phish-2.jpg" alt="" width="300" height="340" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/GMail-Phish-2.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/GMail-Phish-2-265x300.jpg 265w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>The reason it&#8217;s legitimate is because this is the standard screen from Google in regards to this &#8220;new&#8221; app that you want to execute. The app developers (the bad guys) had to specify what permissions their app needed to carry out it&#8217;s nefarious deeds on your e-mail, and so Google helpfully popped up this window to ask you to give permission to the app for the parts of your GMail profile that it needed. Don&#8217;t freak out, there could be genuine reasons an app needs these particular permissions, so this would not have been a red-flag to Google &#8230; the app name on the other hand &#8230; ?.</p>
<p>Anyway, if you click &#8220;allow&#8221;, the app goes ahead and uses your contacts to e-mail a new copy of the phishing e-mail to all your contacts.</p>
<p>Fortunately Google resolved the issue reasonably quickly. If you think you might have been a victim of this attack, you can check very quickly by going to this link <a href="https://myaccount.google.com/permissions">https://myaccount.google.com/permissions</a> and if there is something in the list called &#8220;Google Docs&#8221;, then left-click on it and hit the &#8220;Remove&#8221; button. You&#8217;ll then be safe again, for now.</p>
<p>This was really clever because the evil doers were able to create a sneaky app, with a ridiculously trusty name, which then fooled people into granting seemingly required permissions in the platform (Google in this instance) to enable the app to do something bad. There are other platforms that use a similar set-up &#8211; Facebook and LinkedIn, so be on the lookout for any messages which try to execute apparently genuine &#8220;apps&#8221; that may try to give you a very bad day. Treat all messages that want you to do something that is out-of-the-ordinary with great suspicion. Or you could go all biblical on them and follow <a href="http://www.l2cybersecurity.com/v-cast-aside-e-mails-from-strangers/">Commandment 5</a>.</p>
<p>BTW &#8211; Google didn&#8217;t reveal the number of affected users, they just said less than 0.1% of the GMail accounts were affected &#8211; a tiny fraction, right? Well given they had over a billion users this time last year, means the not insubstantial figure of 1 million is how many were affected. ?</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gmail-users-phished/">GMail had a bad case of the phishers.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
