How to check who's been reading your Gmail
Posted on 25 Jan 2013 at 09:53
Davey Winder reveals how to check for Gmail snoopers and to protect your account
With 350 million users, Microsoft’s Hotmail remains one of the big three players in webmail, along with Yahoo and Gmail. Unlike the last two, though, Microsoft doesn’t make it easy to see whether and when your email accounts have been accessed by unauthorised third parties, nor does it give any indication of who that third-party might be.
Now given that webmail is, understandably, under constant hacker scrutiny, you might be forgiven for thinking that this is an oversight. I certainly find it difficult to believe that Microsoft hasn’t seen fit to add this most basic of snoop-alerting mechanisms to the service.
To make your Gmail account even more secure, I heartily recommend that you implement the two-step authentication system
This baffling inability to see the bigger security and privacy picture is one of the main reasons that I’m nothing but a casual observer of Hotmail, rather than a regular user. Regular readers of PC Pro online may recall that our esteemed editor, Barry Collins, himself learned about Hotmail security woes when he made a brief switch from Gmail. Not that either Yahoo or Google is without fault, and both have had their share of media insecurity headlines lately, but both do at least give their users a quick-and-dirty method of checking account access patterns.
With Gmail, just click on a link at the bottom right of the inbox screen – the link itself tells you when the account was last accessed as a quick visual check, and clicking it pops up a window with far more detailed information about times of access, the device used and the IP address that access was from. According to Sophos technology consultant Graham Cluley, his law-enforcement contacts confirm that Hotmail does actually log this access data and can extract it and make it available to investigators if a warrant so demands. In which case, you have to wonder why it can’t make the same information available to end users.
This type of activity report should be viewed regularly by anyone who takes their security seriously – maybe I’m a little too paranoid, but I check it at the start and end of every day. It’s an easy way to get a heads-up, not only about obvious risks such as jealous partners, stalking strangers or curious hackers, but also about any rogue third-party apps that you may have granted permission to access your email stream.
There’s also a neat feature whereby Google will show you whether your account is being accessed from another location at the same time as you’re reading it; this is listed in the "concurrent session information" table. Most often it just means you’ve left another browser window open somewhere, but there’s no harm clicking the "sign out all other sessions" button just to be on the safe side.
You don’t even have to rely on checking the report yourself, since you can ask Google to monitor for unusual activity and alert you automatically, but it doesn’t hurt to take a proactive approach for good measure. The Gmail last account activity report shows, for example, access by web browser, POP client, mobile devices and third-party applications: if any of these doesn’t make sense – say, your account has been accessed by a mobile device but you use only a web browser, or maybe the time stamp suggests it was accessed while you slept, or even a different IP address from the others in the list was used – chances are that your account security has been compromised. In which case I’d recommend you change your password as a matter of course – along with those for any other service where the password is reused – and change it to something more complex.
Another thing that Gmail has going for it compared with Hotmail is that it allows password strings of more than 100 characters, as opposed to Hotmail’s maximum of 16. This may not seem like a big deal, but as someone who uses character password strings of more than 20 as a matter of course, it’s yet another reason I steer clear of the Microsoft webmail service.
In addition to changing your password, if you think someone has been accessing your account without permission, I’d also suggest that you check one more thing. It’s just possible, if your snooper is technically adept and being a little bit sneaky, that they’ll have second-guessed your intention to change passwords and taken measures to enable them to continue reading your email. They may have gone into your account settings – where the majority of users fear to tread for some reason – and set up an automatic forwarding filter that forwards a copy of everything you receive to another address.
This isn’t as simple for a snooper to achieve as it sounds, because it requires them to enter a confirmation code into your account settings page – but given that this code is sent to the address that the mail would be forwarded to, which belongs to the snooper, this isn’t beyond the realm of possibility. A person who has access to your account could enter the code and activate forwarding without your knowledge. Accessing your settings and hitting the forwarding tab will reveal the presence of any such filter and allow you to disable it.
To make your Gmail account even more secure, I heartily recommend that you implement the two-step authentication system that Google has now rolled out to all users. You can read more details on the benefits of two-step authentication here, and I’ve also written a step-by-step tutorial on how to set it up in Gmail here.
Davey is a contributing editor to PC Pro, having covered the internet as a topic since the magazine started in 1994. Since that time he's won numerous awards for his journalism, but remains a small-business consultant specialising in privacy, security and usability issues.
- The importance of load balancing
- Windows Phone App Studio: an easy way to create your first Windows Phone 8 app
- The end of Windows XP support: what it really means for businesses
- Don't rely on Chrome's password vault
- Using Buffer to manage your social media
- Microsoft needs its own Steve Jobs
- Forget credit cards: hackers want your Facebook account
- Can't get fast enough broadband? Here's what to do
- Leap Motion and the battle against UI stagnation
- How to build a really bad network
- Play it again: Berlin's Computer Game Museum
- Switching from iPhone to Android: what I miss, what I don't
- Tech City: Easy to score when you move the goalposts
- How to remove SkyDrive from the Windows 8.1 Explorer
- Switching from iPhone to Android? Switch off iMessage
- Why is Google pumping more money into Firefox?
- Sky Broadband Shield review
- Samsung Galaxy S4: how to double your battery life
- Motorola Moto G review: first look
- IBM Watson meets Willy Wonka
- Microsoft patches TIFF flaw in next Patch Tuesday
- Microsoft expands encryption over NSA spying "threat"
- UK Cloud Awards 2014: nominations now open
- BlackBerry says "we're still alive" as sales hit new low
- Has HP turned a corner?
- Adobe admits it's struggling to notify hack victims
- Microsoft rolls out Office 365 admin app for mobile
- Office 2013 Service Pack 1 to arrive early next year
- Backup the best defence against CryptoLocker
- UK SMBs can now buy ads on Twitter