yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Wait have I just been attacked? What do I do now?


2m read
·Nov 10, 2024

  • All right, Grace. So ideally we can recognize when we are attacked, but let's say we begin to fall for it. Let's say there's a phishing attack and we go, we click really fast cause we're all panicked. We type in our password and they're like, oh wait, I think I just gave my password to a shady site. What do you do once you're compromised in some way?

  • It's a great question, Sal. Now this is really unfortunate. We hope this doesn't happen to folks, but if it does, there are a few steps you can take to help mitigate the fallout from this kind of phishing attack. You should immediately tell a trusted adult, a teacher, or a parent, and let them know that this happened to you.

This will also help them make others aware that if they are hearing from you on that account that's been compromised, so that other folks don't fall into the same hands of the scammer. This will also help you take steps to report the scam if possible.

So, for example, if you're using Gmail, there is a reporting tool within your email. Oftentimes you can get alerts on your phone if there are phone calls that look like a scam, but there are also ways that you can report that. So definitely work with a trusted adult if you think that this has happened to you.

And then once you've kind of mitigated the fallout from that, you can look at best practices to make sure that that password isn't compromised in other places. So you are going to want to update that password, enroll in two-step verification as we talked about, and make sure that on a regular basis you're changing your password.

So even if this happens to you and you weren't made aware, you can actually mitigate some of that risk if you're updating and having strong passwords on a frequent basis. There's another nifty tool called Security Checkup that can actually help you check on your passwords for all of your accounts where you use your email to log in. And that helps you keep track and make sure that you know your passwords aren't outdated or, you know, worst case scenario that they haven't been breached in some kind of data breach or a phishing attempt.

  • Super, super useful.

More Articles

View All
Spread of Islamic Culture | World History | Khan Academy
Hi man! Hi David! So, what we’re going to do in this video is talk about the cultural spread of Islam. Where are we and when are we right now? So, we are around the early 7th century, and here we see the Byzantine Empire, which at the time was still a co…
The worst self improvement mistake
I feel like all of us at some point in our life have gotten into a bit of a rut, a period of our life where motivation is hard to come by. We’re not feeling as energetic and motivated as we usually are about life in general. And the goals that we’ve set f…
Applying the chain rule twice | Advanced derivatives | AP Calculus AB | Khan Academy
Let’s say that y is equal to sine of x squared to the third power, which of course we could also write as sine of x squared to the third power. What we’re curious about is what is the derivative of this with respect to x? What is dy/dx, which we could als…
The 1619 Project | National Geographic
From the moment we were brought here in bondage in 1619, Black life in this country has been defined by hard work, and our labor has generated success stories that deserve to be celebrated. Commonly, people refer to “The 1619 Project” as a history, but it…
Perverted Analogy Fallacy: look out for it.
So a person might make a claim like, “Uh, taxation is just because those being taxed have given, uh, implicit consent by continuing to live in a territory which is subject to the tax.” Um, and you’d like to get them to examine whether or not this idea of…
Identifying graph for exponential
All right, we are asked to choose the graph of the function, and the function is f of x equal to 2 * 3^x. We have three choices here, so pause this video and see if you can determine which of these three graphs actually is the graph of f of x. All right,…