Email Security Strategies

Before we begin, you can have the most advanced cyber security practices and anti-virus in place, but if you do not have a strong enough password to secure your devices or online accounts, all your security measures might as well be useless. As I have already explained in a previous tutorial, more people are hacked as a result of weak passwords than any other single factor. With that established, the 2nd most common way to hack someone is through their email inboxes or accounts – just ask Hillary Clinton, John Podesta, John Brennan and the DNC about that.

Make no mistake, if some of the worlds most powerful people can have their personal emails hacked, so can you. This is also why learning how to practice better email habits should be of the upmost importance for you heading into the future.

What To Avoid & How Email Hacks are Pulled Off:

While browsing through your email account(s), never open a single email or click on any link(s) from a sender you do not know personally. It might seem harmless, but the simple act of curiously opening an email or clicking on a link within an email can open Malware or register and transmit the IP Address of the device you are using to the sender of that email or link.

When a hacker sends compromising emails or links to your personal inbox it is a technique known as “Phishing,” and it is perhaps the most common form of cyber-attack you will ever encounter. I am willing to bet that everyone whom has ever owned an email account has seen a phishing scheme at one point or another in their lifetime, whether they were even aware of it or not. This is also why it is important to not just leave your email out in the open for all the world to see, or blindly pass it around to so many pages across the internet – especially if you have something to lose.

Believe it or not, there are even free and public services which allow any person to secretly attach a program to any given link or email they send, which automatically transmits data such as your IP Address as soon as you open it. This type of program also reveals things like the time of day you clicked the link, the type of browser you were using and how long you kept the window open. This is also what is referred to as a “trap-link.” The most common of which comes in the form of an “IP-logger,” which automatically registers the data of any device that clicks on it. While this might sound extremely complicated or foreign to you, again, regardless of the legality of it all, there are actually multiple free services, platforms and tools available on the internet for people to do just this.

Needless to say, always use caution and judgement when clicking on any links in your inbox, online chat, message or social media network alike – especially from people/sources/senders you do not know/trust or have never done business with directly. Lastly, getting your IP logged is the least of your concerns – it’s just the most common practice. Typically, hackers will “Spear-Phish” different/specific emails with malicious links that can secretly upload or install malware onto a users device, granting further access to their information. Additionally, every file you download should be immediately scanned by your anti-virus, because Microsoft Word documents and weaponized pdf’s are increasingly being used by the world’s most sophisticated hackers – because these are the most widely downloaded types of documents online, making them the easiest means to widely install malware on more peoples devices.

Separate Your Inboxes:

A good practice is to also use separate accounts for different purposes. For example, use a separate email account for your online banking and/or business than you would use for family, friends, or subscribing to magazines. This ensures that if one account is ever breached or compromised, not every aspect of your life gets compromised along with it. Additionally, use separate passwords for separate accounts and always reserve your strongest passwords for your most important accounts. You should also utilize two-factor authentication whenever and wherever possible.

If you are a website domain owner, or own multiple email accounts, you can also secure your personal or business inbox behind a mail forwarding service through your domains DNS settings or an alternative service provider. Selecting this option will allow you to pass out an email address without actually revealing the true end destination where those emails will be sent, essentially turning the mail forwarding address into an “alias” or “proxy” for your real account.

If you would like to learn more about alternative/encrypted email service providers, as well as why you should consider making the switch to them, please utilize the following link:

If you need help learning how to read, write and remember stronger passwords to secure your online accounts, please utilize the following link:

xS1lenc3d of Iznaye Dumps +70,000 Customer Emails Online Following Attack on The Forums of Peugot France

Earlier today, May 1st 2019, a hacker going by the name of “xS1lenc3d” () of the international hacking group referring to themselves as “Iznaye” () released a massive leak of customer email addresses attached to the forums of Peugeot France – a French based automotive manufacturing company. The leak is significant, allegedly exposing over 70,000 customer emails spanning almost a decade. The leak itself comes in the form of multiple individual Microsoft Excel files, dating between March 18th 2010 to November 5th 2018 – again, encompassing over 70,000 individuals.

xS1lenc3d is said to have carried out the attack in solidarity with the Yellow Vest protesters of France. More specifically, in a message attacked to the release, xS1lenc3d stated:

The French people are rising against to protest in France, fighting for their rights and freedoms. Mr. Macron seems to the President of ALL the French People.

If you do not want these demonstrations to turn into a Revolution, listen to them, listen to us. Take care of these revolts, those people who do not even have enough money to feed themselves. These people are victims of this society so unfair and unequal. I will tell you, Mr. President, you are not able to run a country like France.

We will not submit,
We will continue to fight,
Until the last drop of blood.

Target: hxxp://
Data Leak:

Senator Scott Demands Meeting w/ FBI Following Release of Mueller Report

Over the course of my 4 year career, for whatever reason, one of the topics I’ve covered most heavily are the US elections hacking/tampering campaigns of 2016 – and US voter hacks in general. In fact, this topic was the first article I ever covered here for Rogue Media Labs, following a voter registration leak of 35 million records less than a month before the November elections of 2018. Perhaps this is why I happen to find a recent letter from Senator Rick Scott (R-FL) particularly interesting. In it, Scott is essentially demanding that the US Federal Bureau of Investigation make public any/all records they have in regards to voter fraud and/or election interference in the state of Florida, after information contained in the Mueller Report was redacted.

More specifically, according to the results of the Mueller Report, approximately 120 different election officials throughout Florida were found to have had their personal email addresses hacked by foreign threat actors – though the report never did specify whom exactly or what counties around Florida they represented. Consequentially, this is also what Senator Scott would like to find out – in order to predict which areas of his state may be most susceptible to voter fraud and/or tampering next year, ahead of the 2020 elections.

For those of you whom might be unaware, Florida is quite literally the United States most “transient” state, with the highest population of active residents residing outside of that state – at least depending on the time of year. Generally speaking, Florida is also considered the have the US’s single largest and most undecided/unpredictable voter bases – making it the US’s largest “Swing State” election after election. Because of this, and for literally all of the same reasons, it theoretically makes Florida voting systems and records the single easiest to fake or tamper with at the same time. For the time being, it appears as though the FBI has agreed to meet with Senator Scott to address these issues, though an exact time and date have not been set.

Download Copy of Letter: https://www. files/2019-04/190419-FBI-GRU-Florida.pdf

Browse Letter:

[pdf-embedder url=””%5D

Russian Hacker Alexx HackAll Leaks Access To Close to 4,700 US-Based Email Addresses Online

A Russian hacker going by the name of “Alexx HackAll” has just released access to approximately 4,696 US based email accounts through the Pastebin web service. Investigating the incident further, it’s not quite clear where the hacker downloaded the information from or which service, if any, this effects, but the hacker is known to have compromised various online gaming services throughout the past and actively features Bitcoin wallet hacking tutorials on his YouTube page.

For the time being you can find 4,696 US-based emails, along with their passwords, through the leak provided below.

Leaked Emails & Passwords: