yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Wait have I just been attacked? What do I do now?


2m read
·Nov 10, 2024

  • All right, Grace. So ideally we can recognize when we are attacked, but let's say we begin to fall for it. Let's say there's a phishing attack and we go, we click really fast cause we're all panicked. We type in our password and they're like, oh wait, I think I just gave my password to a shady site. What do you do once you're compromised in some way?

  • It's a great question, Sal. Now this is really unfortunate. We hope this doesn't happen to folks, but if it does, there are a few steps you can take to help mitigate the fallout from this kind of phishing attack. You should immediately tell a trusted adult, a teacher, or a parent, and let them know that this happened to you.

This will also help them make others aware that if they are hearing from you on that account that's been compromised, so that other folks don't fall into the same hands of the scammer. This will also help you take steps to report the scam if possible.

So, for example, if you're using Gmail, there is a reporting tool within your email. Oftentimes you can get alerts on your phone if there are phone calls that look like a scam, but there are also ways that you can report that. So definitely work with a trusted adult if you think that this has happened to you.

And then once you've kind of mitigated the fallout from that, you can look at best practices to make sure that that password isn't compromised in other places. So you are going to want to update that password, enroll in two-step verification as we talked about, and make sure that on a regular basis you're changing your password.

So even if this happens to you and you weren't made aware, you can actually mitigate some of that risk if you're updating and having strong passwords on a frequent basis. There's another nifty tool called Security Checkup that can actually help you check on your passwords for all of your accounts where you use your email to log in. And that helps you keep track and make sure that you know your passwords aren't outdated or, you know, worst case scenario that they haven't been breached in some kind of data breach or a phishing attempt.

  • Super, super useful.

More Articles

View All
The Housing Market Bubble Just Popped
What’s up you guys, it’s Graham here! So we have to talk about what’s going on with the housing market because it was just found out that prices are continuing to go higher. Wait, what? Yep, you heard that correctly! Even though housing starts have dropp…
Panda School: (EXCLUSIVE) How the National Zoo Trains Its Panda Cub | National Geographic
I’m one of a very select group of people to get to interact with this animal, and I don’t take that for granted. It’s really cool for me to get to do something like that. Beibei is just absolutely a joy to work with. There is something about him; he’s so …
Drawing Lewis diagrams | AP Chemistry | Khan Academy
In this video, we’re going to think about constructing Lewis diagrams, which you’ve probably seen before. They’re nice ways of visualizing how the atoms in a molecule are bonded to each other and what other lone pairs of valence electrons various atoms mi…
A Warning For Landlords | Expectation vs Reality
What’s up you guys? It’s Graham here. So we got to have a serious sit-down conversation today and talk about the business of investing in real estate, owning rental property, and more specifically becoming a landlord. Because I’ll admit it’s easy to glam…
Interpreting computer regression data | AP Statistics | Khan Academy
In other videos we’ve done linear regressions by hand, but we mentioned that most regressions are actually done using some type of computer or calculator. So, what we’re going to do in this video is look at an example of the output that we might see from …
The Methods of Mathematics Are Fallible
If I quickly compare it to physics, we have this domain called particle physics. The deepest theory we have in particle physics is called the Standard Model, which describes all of the different fundamental particles that there are and the interactions be…