

You can import pictures directly from your digital camera into this wonderful tool. You could certainly understand why someone freaked out by the Evernote security breach would be alarmed to receive an email with links like that.įollow on Twitter for the latest computer security news.Evernote is the notebook for the digital times – it can store your notes, addresses, todo task, graphics, clips from web pages and so on in easy to be searched and categorized format. That’s a technique commonly used in a normal marketing email communications, but looks very out of place in an email about a security breach which tries to hammer home the point to “Never click on ‘reset password’ requests in emails – instead go directly to the service”. Presumably that’s so Evernote can track and collect data on how successful the email campaign has been.

The links in this case *do* end up taking you to Evernote’s website – but go silently via Silverpop’s systems first. mkt5371 is a domain owned by Silverpop, an email communications firm who Evernote has clearly employed to send emails to its 50 million or so affected users.

This was just carelessness on Evernote’s part. Now, before you panic that someone is attempting to phish your Evernote credentials with a craftily-designed email, just relax. Uh-oh, in the same email that Evernote tells users not to click on ‘reset password’ requests sent via email, they have clickable links.Īnd what might make some recipients pause for thought is that the links don’t go directly to, but instead link to a site called mkt5371. That’s a very sound piece of advice, because of the obvious threat – after millions of Evernote customers had their usernames and email addresses stolen – of phishing email attacks.īut take a closer look at the email that Evernote has sent out, with the subject line “Evernote Security Notice: Service-wide Password Reset”: Never click on 'reset password' requests in emails - instead go directly to the service. The email goes on to give some password advice – including a warning: After being hacked, Evernote, quite responsibly, has sent out emails to its users informing them of the security breach – and letting them know that it has decided to reset all passwords.
