<p>2017/08/04 14:57 "Xen" <<a href="mailto:list@xenhideout.nl">list@xenhideout.nl</a>>:<br>
><br>
> Volker Wysk schreef op 04-08-2017 7:46:<br>
><br>
><br>
>> The links are <a href="https://accounts.google.com/.">https://accounts.google.com/.</a>.. and (enclosed) https://<br>
>> <a href="http://myaccount.google.com/.">myaccount.google.com/.</a>.. . I assume that they can't fake a <a href="http://google.com">google.com</a> domain<br>
>> name, right?<br>
><br>
><br>
> If you can be sure you didn't actually visit something else, that is correct.</p>
<p>DNS poisoning. </p>
<p>Or, if you are not using plaintext, the displayed URL can be different from the actual link.</p>
<p>>> What's more, I've changed the password in my smartphone and my fetchmail<br>
>> configuration, and it works fine with the new password. When the old one was<br>
>> still in place, I've got error messages for both.<br>
><br>
><br>
> If you changed through someone else's service it might still have used Google to effectuate the change but could have been a simulation around it, in that case you indeed did change your password but then the hacker would also know the new one and would keep it for reference.<br>
></p>
<p>man-in-the-middle</p>
<p>Never visit the link in that mail again, just in case.</p>
<p>Use a different device, preferably on a network you trust, go directly to Google by typing the address in the browser URL field. Change your passwords again, to something completely different.<br></p>