yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Wait have I just been attacked? What do I do now?


2m read
·Nov 10, 2024

  • All right, Grace. So ideally we can recognize when we are attacked, but let's say we begin to fall for it. Let's say there's a phishing attack and we go, we click really fast cause we're all panicked. We type in our password and they're like, oh wait, I think I just gave my password to a shady site. What do you do once you're compromised in some way?

  • It's a great question, Sal. Now this is really unfortunate. We hope this doesn't happen to folks, but if it does, there are a few steps you can take to help mitigate the fallout from this kind of phishing attack. You should immediately tell a trusted adult, a teacher, or a parent, and let them know that this happened to you.

This will also help them make others aware that if they are hearing from you on that account that's been compromised, so that other folks don't fall into the same hands of the scammer. This will also help you take steps to report the scam if possible.

So, for example, if you're using Gmail, there is a reporting tool within your email. Oftentimes you can get alerts on your phone if there are phone calls that look like a scam, but there are also ways that you can report that. So definitely work with a trusted adult if you think that this has happened to you.

And then once you've kind of mitigated the fallout from that, you can look at best practices to make sure that that password isn't compromised in other places. So you are going to want to update that password, enroll in two-step verification as we talked about, and make sure that on a regular basis you're changing your password.

So even if this happens to you and you weren't made aware, you can actually mitigate some of that risk if you're updating and having strong passwords on a frequent basis. There's another nifty tool called Security Checkup that can actually help you check on your passwords for all of your accounts where you use your email to log in. And that helps you keep track and make sure that you know your passwords aren't outdated or, you know, worst case scenario that they haven't been breached in some kind of data breach or a phishing attempt.

  • Super, super useful.

More Articles

View All
Fiscal and monetary policy in parallel | AP Macroeconomics | Khan Academy
In previous videos, we have talked at length about fiscal policy, and in other videos, we’ve talked at length about monetary policy. But now we’re going to talk about them together. Because at any given time in a country, there is some type of fiscal poli…
My Response to the NAR Lawsuit (Real Estate Is Changing Forever)
What’s up, you guys? It’s Graham here. So this is something I wasn’t sure I wanted to address or even if there’d be enough interest for me to talk about this. But after repeatedly being asked to comment on the recent class action lawsuit against the Nati…
Snowflake Science to Study Avalanches | Explorer
Snowflakes are one of mother nature’s most exquisite creations—fragile snow crystals that dazzle us in an array of shapes and sizes. But there’s a lot more to these intricate ice formations than meets the eye. Turns out that by looking a lot closer, snowf…
15 Reasons You are Behind in Life
Sometimes you’re behind in life for reasons that were initially out of your control. Sometimes you’re behind because of poor decisions you made when you had little life experience. But if you’re watching this video right now, then you’re self-aware enough…
Recognizing quadratic factor methods part 2
In the last video, we looked at three different examples. It really is a bit of a review of some of our factoring techniques and also to appreciate when we might want to apply them. We saw in the first example that it was just a process of recognizing a …
Introduction to series analyzing income and wealth trends in the US | Khan Academy
Sal Khan here from Khan Academy. What you’re seeing over the next few videos are analyses of charts and data that are put together by The New York Times around trends in wealth, income, and income inequality. Our goal here is to give you extra context, e…