yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Wait have I just been attacked? What do I do now?


2m read
·Nov 10, 2024

  • All right, Grace. So ideally we can recognize when we are attacked, but let's say we begin to fall for it. Let's say there's a phishing attack and we go, we click really fast cause we're all panicked. We type in our password and they're like, oh wait, I think I just gave my password to a shady site. What do you do once you're compromised in some way?

  • It's a great question, Sal. Now this is really unfortunate. We hope this doesn't happen to folks, but if it does, there are a few steps you can take to help mitigate the fallout from this kind of phishing attack. You should immediately tell a trusted adult, a teacher, or a parent, and let them know that this happened to you.

This will also help them make others aware that if they are hearing from you on that account that's been compromised, so that other folks don't fall into the same hands of the scammer. This will also help you take steps to report the scam if possible.

So, for example, if you're using Gmail, there is a reporting tool within your email. Oftentimes you can get alerts on your phone if there are phone calls that look like a scam, but there are also ways that you can report that. So definitely work with a trusted adult if you think that this has happened to you.

And then once you've kind of mitigated the fallout from that, you can look at best practices to make sure that that password isn't compromised in other places. So you are going to want to update that password, enroll in two-step verification as we talked about, and make sure that on a regular basis you're changing your password.

So even if this happens to you and you weren't made aware, you can actually mitigate some of that risk if you're updating and having strong passwords on a frequent basis. There's another nifty tool called Security Checkup that can actually help you check on your passwords for all of your accounts where you use your email to log in. And that helps you keep track and make sure that you know your passwords aren't outdated or, you know, worst case scenario that they haven't been breached in some kind of data breach or a phishing attempt.

  • Super, super useful.

More Articles

View All
5 BIG Investing Mistakes to Avoid | Stock Market Red Flags
Hey guys! Welcome back to the channel. In this video, we are going to be talking about five really major red flags that you should always be watching out for and avoid companies that show any of these signs. You do not want to invest in any companies that…
The Power Of Walking Away
Somehow, many people feel obligated to give away their time and energy to others. But why? Perhaps they feel the need to prove themselves or have the intense desire to be liked? The problem is that by caring too much about opinions of other people, you be…
Welcome to the Gigafactory | Before the Flood
I mean that fossil fuel industry is the biggest industry in the world. They have more money and more influence than any other sector. So, I mean, do it; the more that they can be sort of popular uprising against that, the better. But I think the scientifi…
Just made an offer to buy another property...this is what happened
What’s up you guys, it’s Graham here. So, two things with this video. The first one is that usually I have a video planned out. This is not the case; I’m just gonna be freestyling it to a camera. The second thing, I’m not everyone says this—I don’t know i…
Jesus Christ and Christianity | World History | Khan Academy
We’re now going to talk about the beginnings of one of the most important religions in human history, and even today the largest religion on earth, and that of course is Christianity. The central figure in Christianity is Jesus Christ, and the term “Chris…
Worked example: Calculating the pH after a weak acid–strong base reaction (excess acid)
Let’s look at a reaction between a weak acid, acetic acid, and a strong base, sodium hydroxide. Let’s say we have 100 milliliters of a 2.0 molar solution of aqueous acetic acid, and that’s mixed with 100 milliliters of a 1.0 molar solution of aqueous sodi…