What to Do When Your Email was Hacked?

2:21 PM
What to Do When Your Email was Hacked? -

If your friends receive e-mails from you with a link to an online store Viagra, your email account has probably been hacked. Email hacking happens more often than not.

Follow the steps below to recover and protect you.

Step 1. Check Your Email was Hacked

First, we will determine whether or not what you feel is really a violation account, starting with mail templates electronic. Check your sent mail folder. Are there any of these emails you definitely have not sent? Do you receive e-mails from "mailer-daemon" that suggest that you try to contact an unknown email address? Are you receiving a contact friends or family by saying they receive strange e-mail from your address? A yes to any of these questions may indicate a hack.

In addition, more subtle changes can indicate tampering as well. Check your account settings. Does your email signature changed? Your email is sent to a strange address? Do you have an auto-reply email set up that you did not before? Are their user ID, or respond to addresses associated with your account that you do not recognize? These changes are an attempt to track password changes and maintain control.

Finally, there are obvious changes in user access. Is your password no longer work, even if you are certain it is the correct password? Keep you expelled from your email while accessing? Is your email provider blocked account? In each case, these points to the fact that your account is indeed compromised

Step 2 :. Cutting Ties

The pirates do not break in to steal your email coupons, they have bigger goals in mind that involve using your website password or your financial information.

Malware is one of the favorite weapons of pirates. Your system may be infected with malicious software that tracks your keystrokes or mines passwords.

Since this software allow the hacker to access your account again, even after cleaning it, first remove the rear doors. If you do not currently have anti-malware software installed, several options are available, including Microsoft Security Essentials, Norton Antivirus and McAfee. You should also consider using Hotspot Shield Malware Protection.

Next lock your account. Your password, change your password (if you can access your account), or if necessary, contact your service provider for additional help. Help pages for several popular services are listed here:

  • Apple
  • Facebook
  • Google
  • Microsoft
  • Twitter
  • Yahoo

once you have access to your account again, contact someone in your address book, and let them know that you were attacked and not to click on suspicious links or emails.

then enter your account settings and reset before email signatures, email addresses and related identifiers. These two steps will keep the mechanism that has infiltrated your account to spread, and keep ambitious hackers to take control

The most tedious step comes next :. Ensure all connected to this account. Like most of us have personal, financial, and connection information stored on our e-mail addresses, the data becomes a high priority for criminals.

Check online retailers for new payment methods or shipping addresses. Lock your credit by calling the credit bureaus and inform them of the intrusion.

keep records and file a police report of all changes. Check all potential security holes wherever you exist on the Internet and make sure they are sealed tight by changing passwords, eliminating the related accounts, and by recommendation, de-authorizing Wired related applications Twitter and Facebook.

Step 3: How to avoid future attacks

Very well. We plugged the dam, so to speak. The next step is to take the necessary precautions to prevent future attacks.

Your first line of defense is a strong password. Studies have shown that the time required to crack a 6 character, all lowercase password is a lean 10 minutes. Passwords must have a substantial length, mixed cases, including numbers and special characters in a way that has no grammatical sense. Avoid phrases or words in English and instead consider replacing letters with numbers (eg "h0cK3yFaN" instead of "hockeyfan"). Also, avoid using the same password for multiple websites. Hackers are aware that this is common practice and exploit the fact for maximum benefit.

Software Update your next barrier. Many malicious attacks can come from security vulnerabilities in non updated operating systems to install all recommended updates and critics frequently. Keep virus definitions and malware updates to your anti-virus software and run regular scans to detect potential threats.

At this point, Switched recommends the creation of three unique email addresses, each with a specific purpose. Use your integrated suppliers in the account recovery tools by recording an email address and alternate phone number. This will make account recovery easier and verification in the future of identity.

Establish addresses your repository for sensitive information and make sure it has a strong password, changed regularly. Finally, establish the final email address as your address "subscription". That's where coupons, newsletters, Twitter updates and Facebook go. The idea is to compartmentalize your digital life in specific areas so that hackers can not just undermine your account all relevant information. Again, this may seem exaggerated, but in the face of thousands of dollars in financial losses, the step may seem more reasonable.

Finally, and most importantly, correct your behavior and habits. An incident investigation email infiltration revealed that user error is to blame for a large number of security holes!

People are attracted by their offers and are victims of identity thieves and hackers on a regular basis. Protect yourself by avoiding emails or suspicious links. No entity in reputable online will ask for your password via email or chat, so do not fall for these tricks.

Avoid becoming a target for these types of attacks by not listing your email address publicly on forums, social networking, blogs or

Finally, remember that the public computers are exactly that :. public. Avoid checking email on public computers, and if you do, make sure you log out of your account before you close the browser window. Remember, safety starts and ends with you.

Email hacking is becoming a more common occurrence every day, and although there are now tools available to ward successful hacking attempts, these attacks are becoming more sophisticated by the day.

Protect yourself by maintaining secure passwords, the software updated, online identities compartmentalized, and good behavior of the user. Nothing wrong quite like a cyber attack, especially when prevention is just a few mouse clicks.

Previous
Next Post »
0 Komentar