yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Wait have I just been attacked? What do I do now?


2m read
·Nov 10, 2024

  • All right, Grace. So ideally we can recognize when we are attacked, but let's say we begin to fall for it. Let's say there's a phishing attack and we go, we click really fast cause we're all panicked. We type in our password and they're like, oh wait, I think I just gave my password to a shady site. What do you do once you're compromised in some way?

  • It's a great question, Sal. Now this is really unfortunate. We hope this doesn't happen to folks, but if it does, there are a few steps you can take to help mitigate the fallout from this kind of phishing attack. You should immediately tell a trusted adult, a teacher, or a parent, and let them know that this happened to you.

This will also help them make others aware that if they are hearing from you on that account that's been compromised, so that other folks don't fall into the same hands of the scammer. This will also help you take steps to report the scam if possible.

So, for example, if you're using Gmail, there is a reporting tool within your email. Oftentimes you can get alerts on your phone if there are phone calls that look like a scam, but there are also ways that you can report that. So definitely work with a trusted adult if you think that this has happened to you.

And then once you've kind of mitigated the fallout from that, you can look at best practices to make sure that that password isn't compromised in other places. So you are going to want to update that password, enroll in two-step verification as we talked about, and make sure that on a regular basis you're changing your password.

So even if this happens to you and you weren't made aware, you can actually mitigate some of that risk if you're updating and having strong passwords on a frequent basis. There's another nifty tool called Security Checkup that can actually help you check on your passwords for all of your accounts where you use your email to log in. And that helps you keep track and make sure that you know your passwords aren't outdated or, you know, worst case scenario that they haven't been breached in some kind of data breach or a phishing attempt.

  • Super, super useful.

More Articles

View All
Accounting profit vs economic profit | APⓇ Microeconomics | Khan Academy
Let’s continue thinking about how rational agents make decisions. So here, we’re told that Sally runs a business that only sells hamburgers in a building she owns. Every month, they sell 5,000 hamburgers at five dollars per hamburger. She spends two dolla…
How Hot Can It Get?
Hey, Vsauce. Michael here. And my tea is quite hot, but it’s not the hottest thing in the universe. So what is? I mean, we know that there is an absolute zero, but is there an absolute hot? A point at which something is so hot it can’t get any hotter. We…
How to light multiple matches with a single bullet
Hey, it’s me Destin. About three years ago I did a YouTube video, but I tried to have a lot of matches with a bullet, and I never could do it. So, we’ve kind of up the ante here. We’ve taken that same rifle, that Ruger 10⁄22, and we’ve made a fully adjust…
Do Robots Deserve Rights? What if Machines Become Conscious?
Imagine a future where your toaster anticipates what kind of toast you want. During the day, it scans the Internet for new and exciting types of toast. Maybe it asks you about your day and wants to chat about new achievements in toast technology. At what …
Shockwave Shadows in Ultra Slow Motion (Bullet Schlieren) - Smarter Every Day 203
Hey, it’s me Destin. Welcome back to “Smarter Every Day.” As long as I’ve understood the physics, I’ve wanted to visualize the shock wave on the front of a supersonic bullet. But the problem with doing this is you have to have access to some pretty expens…
Spinning Tube Trick Explained
[Applause] [Music] So, how does the spinning tube trick work? Well, a lot of you identified that the tube is rotating about its long axis, and it’s also rotating horizontally about its middle. But how does that allow us to see one symbol and not the othe…