One of the most important problems that us as Internet users can face, is that our accounts can be hacked. This can happen for different reasons. The password may be stolen through a Phishing attack, keylogger or any other malware. It may even be the case that a social network or platform that we use has suffered an attack and we have the report that our information is leaked.

When an account is hacked, its owner’s sensitive data can find its way into the wrong hands rather quickly. Cybercriminals can then access online payment services like PayPal, make purchases on your behalf, leak corporate secrets or carry out click scam practices. In these cases the consequences can be really serious, but, before you panic, it is best to remain calm and look for alternatives the sooner we act, the better.

The first and most basic thing: change the password. This is something we should do whenever we have a slight suspicion that someone has been able to access the account. We may not have seen clear evidence, but yes, for example, if we have forgotten our account started on a third-party computer it is very important to carry out this step as soon as possible.

▸Report the attack

Normally platforms such as social networks have an option to report an attack. This is also a measure that we can take into account. In this way we will alert that service that our account has been hacked, something that could help to recover it and thus prevent that possible intruder from continuing within it.

▸If the password has already been changed

You may still be able to access the account by answering one or more security questions, as is the case with most providers. Use the “Remember password” function for this. Depending on what information has been provided when creating the account, you will have to answer questions such as “your mother’s first name” or “name of your first pet”, answers that, as a general rule, only you know, as soon as you manage to have access to it changes the password and takes other measures.

Scan the entire system

Search for malware, for example, with a rescue disk such as Kaspersky’s Rescue Disk, among other major software manufacturers, or with an online tool you can do this task. This is because if the keylogger was the method with which the key was spied, the software it could also read the new password.

Read also:
Password Manager – What you should know
Social Engineering – What we should know about this


Por Truxgo

Un comentario en «I’ve been hacked! – what can I do?»

Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *

This will close in 0 seconds