yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Wait have I just been attacked? What do I do now?


2m read
·Nov 10, 2024

  • All right, Grace. So ideally we can recognize when we are attacked, but let's say we begin to fall for it. Let's say there's a phishing attack and we go, we click really fast cause we're all panicked. We type in our password and they're like, oh wait, I think I just gave my password to a shady site. What do you do once you're compromised in some way?

  • It's a great question, Sal. Now this is really unfortunate. We hope this doesn't happen to folks, but if it does, there are a few steps you can take to help mitigate the fallout from this kind of phishing attack. You should immediately tell a trusted adult, a teacher, or a parent, and let them know that this happened to you.

This will also help them make others aware that if they are hearing from you on that account that's been compromised, so that other folks don't fall into the same hands of the scammer. This will also help you take steps to report the scam if possible.

So, for example, if you're using Gmail, there is a reporting tool within your email. Oftentimes you can get alerts on your phone if there are phone calls that look like a scam, but there are also ways that you can report that. So definitely work with a trusted adult if you think that this has happened to you.

And then once you've kind of mitigated the fallout from that, you can look at best practices to make sure that that password isn't compromised in other places. So you are going to want to update that password, enroll in two-step verification as we talked about, and make sure that on a regular basis you're changing your password.

So even if this happens to you and you weren't made aware, you can actually mitigate some of that risk if you're updating and having strong passwords on a frequent basis. There's another nifty tool called Security Checkup that can actually help you check on your passwords for all of your accounts where you use your email to log in. And that helps you keep track and make sure that you know your passwords aren't outdated or, you know, worst case scenario that they haven't been breached in some kind of data breach or a phishing attempt.

  • Super, super useful.

More Articles

View All
How the Inverted Yield Curve Reliably Predicts Recessions.
It’s what everybody’s talking about. Recession fears are rising. The spread between the two-year and the 10-year bond officially inverted for the first time since 2019, a sign that a recession could be on the horizon. It’s predicted every recession, reces…
When Money is No Longer an Issue
You’ve made more money than you could possibly imagine. You and your loved ones will not have to worry about financial problems for the rest of your lives. But there is a lot more life left. So what do you do now, especially since you’re struggling to fin…
Fishing Tips: How to Handline | Wicked Tuna: Outer Banks
[Applause] [Music] [Applause] Hand lining is what we used to do years ago, 30 years ago, before Tyler was born, before all these guys were even on a boat fishing. We used to do handlines; now they do rod and rails. They just crank. It’s very important wh…
Implanting Memories | Breakthrough
My work focuses on finding individual memories in the brain and actually turning them on or off. We had a series of projects where we started off by asking really simply: can we go in and can we just find a memory in the brain? Can we isolate a memory in …
Identifying tax incidence in a graph | APⓇ Microeconomics | Khan Academy
We are asked which of the following correctly identifies the areas of consumer surplus, producer surplus, tax revenue, and deadweight loss in this market after the tax. So, pause this video, have a go at it. Even if you struggle with it, it’ll make your b…
Writing a differential equation | Differential equations | AP Calculus AB | Khan Academy
Particle moves along a straight line. Its speed is inversely proportional to the square of the distance s it has traveled. Which equation describes this relationship? So I’m not going to even look at these choices and I’m just going to try to parse this …