Articles in Category: Hacks, Hacking and Hacked Accounts
How do avoid getting hacked and what to do if you are.
Strong passwords are important, but they don’t protect you from everything. I’ll look at other ways your account can be compromised.
I see people lose access to their most important accounts all the time. It’s often their own fault that they can’t regain access.
Online shopping is ubiquitous, and yet some avoid it completely. Why are some people afraid to shop online when it’s arguably safer than offline?
When you see the list of possible hacking signs, it’s easy to jump to the conclusion your computer has been hacked. It’s usually not the case. Regardless, prevention is always easier than recovery from an actual hack.
If your account has not actually been hacked, there’s little anyone can do to find out who’s trying to log in as you. But there are steps you can take to protect yourself from would-be hackers and phishing scams.
Mat Honan is a reporter for Wired magazine whose digital life was effectively destroyed due to account hacks and lax security policies. There are important lessons here.
It’s natural to want to find out who hacked your email and why. Begin by recovering and securing your account. I’ll review what steps you can take after that, and their chances of success.
Regardless of your initial thoughts, every account is important, and you and I are all targets.
Another scare about two-factor authentication perhaps being hackable? DO NOT let that stop you from using it.
Another week, another breach. What steps should you take in the wake of the latest large-scale data breach?
Here are the steps you need to take to prevent losing your account — forever — to a hacker.
Unless a password’s been changed, it’s difficult for a typical user to tell if their computer or account is being hacked.
Hacking a turned-off computer requires a few mistakes on your part. It’s unlikely, but possible.
Some hackers just go for the low-hanging fruit and try the most common passwords, and there is one scenario where brute force works very well.
When you think about the complexity of today’s systems it’s kind of amazing, really, that we don’t have more breaches!
The bad guys can do anything they want to your computer if they can gain access.
Hackers are very good at sending emails that look like they come from legitimate companies. So, how do you tell the truth from a lie?
Are you curious what might happen if a hacker was in control of your computer? The question really is “What can’t they do?”
There are tools out there that can remove malware completely so that it does not come back. But it’s worth taking a look at your own internet habits.
That’s a composite of several questions that I’ve received relating to a recent theft of something like two million user accounts and passwords. I’ll address this specific incident, but I also want to discuss some things to consider with any large scale account theft.
Internet café hackers can get at you in a number of different ways, but how much do you really need to worry?
Router hacking is rare, but it can happen. I’ll discuss what it is.
If you’ve been hacked… you’ve been hacked. That means the hacker had access to everything on your computer or in (and linked to) your email account. In either case, you need to review your security.
Hacking attempts happen all day long. You really need to protect yourself 24/7. Fortunately, there are several steps that you can take to stay safe.
It’s very possible that your machine has become so infected that recovery really isn’t a possibility. If this is the case, the only practical solution is to wipe the slate clean and start over from scratch.
If your anti-malware tools removed the malware but this browser hijack keeps coming back, then you might be doing something to invite it back on to your system.