Articles in Category: Hacks, Hacking and Hacked Accounts
How do avoid getting hacked and what to do if you are.
If you’re curious what might happen if a hacker was in control of your computer, the question really is “What can’t they do?”
Once your account has been hacked, there are many things you need to consider to prevent it from being hacked again.
Recovery codes protect you against account loss. The issue? Where to store them safely.
Google/Gmail account hacks happen. Take these steps to recover your account and prevent it from being hacked again.
A dictionary attack is a common brute-force way of achieving a hacker’s goal. The goal of a dictionary attack could range from compromising your system to sending spam.
Deleting an account you don’t have access to is kind of the same as deleting an account you don’t own.
Like a row of dominos, gaining access to one account can lead to others being compromised.
Even if your bank account is zero or you’re just not that interesting, hackers are still after your accounts. Here’s why, and what you can do.
Some hackers go for the low-hanging fruit and try the most common passwords, but there is one scenario where brute force works very well.
Here are the steps you need to take to prevent losing your account forever to a hacker.
Alternate email addresses are an important security setting that can allow you to regain access to your account if it’s hacked or you forget your password.
Way too often, I hear from people who have lost their accounts permanently. Here’s how to avoid being one of them.
I see people lose access to their most important accounts all the time. It’s often their own fault that they can’t regain access.
Data breaches rarely expose multiple accounts. There are rare scenarios where multiple accounts might still be at risk, though.
When you think about the complexity of today’s systems, it’s kind of amazing that we don’t have more breaches.
Leaving your computer on 24 hours a day rarely increases risk significantly, as long as you follow a couple of simple guidelines.
Another week, another breach. What steps should you take in the wake of the latest large-scale data breach?
The Google Account Recovery process may be able to help you get your account back. Maybe.
When things behave unexpectedly, many people assume their computer has been compromised by remote hackers. Many of those people are wrong.
Regardless of your initial thoughts, every account is important, and we are all targets.
Another day, another breach. What should you do if you’re involved?
Hacking a turned-off computer requires a few mistakes on your part. It’s unlikely, but possible.
Desperation can lead you to consider hiring so-called “legit”, “ethical”, or “white-hat” hackers to regain control of a your account. Don’t do it.
Strong passwords are important, but they don’t protect you from everything. I’ll look at other ways your account can be compromised.
Online shopping is ubiquitous, and yet some avoid it completely. Why are some people afraid to shop online when it’s arguably safer than offline?
When you see the list of possible hacking signs, it’s easy to jump to the conclusion your computer has been hacked. It’s usually not the case. Regardless, prevention is always easier than recovery from an actual hack.
If your account has not actually been hacked, there’s little anyone can do to find out who’s trying to log in as you. But there are steps you can take to protect yourself from would-be hackers and phishing scams.
Mat Honan is a reporter for Wired magazine whose digital life was effectively destroyed due to account hacks and lax security policies. There are important lessons here.
It’s natural to want to find out who hacked your email and why. Begin by recovering and securing your account. I’ll review what steps you can take after that, and their chances of success.
Another scare about two-factor authentication perhaps being hackable? DO NOT let that stop you from using it.
Unless a password’s been changed, it’s difficult for a typical user to tell if their computer or account has been hacked.
The bad guys can do anything they want to your computer if they can gain access.
Hackers are very good at sending emails that look like they come from legitimate companies. So, how do you tell the truth from a lie?
There are tools out there that can remove malware completely so that it does not come back. But it’s worth taking a look at your own internet habits.
That’s a composite of several questions that I’ve received relating to a recent theft of something like two million user accounts and passwords. I’ll address this specific incident, but I also want to discuss some things to consider with any large scale account theft.
Internet café hackers can get at you in a number of different ways, but how much do you really need to worry?
Router hacking is rare, but it can happen. I’ll discuss what it is.
If you’ve been hacked… you’ve been hacked. That means the hacker had access to everything on your computer or in (and linked to) your email account. In either case, you need to review your security.
Hacking attempts happen all day long. You really need to protect yourself 24/7. Fortunately, there are several steps that you can take to stay safe.
It’s very possible that your machine has become so infected that recovery really isn’t a possibility. If this is the case, the only practical solution is to wipe the slate clean and start over from scratch.
If your anti-malware tools removed the malware but this browser hijack keeps coming back, then you might be doing something to invite it back on to your system.