yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Wait have I just been attacked? What do I do now?


2m read
·Nov 10, 2024

  • All right, Grace. So ideally we can recognize when we are attacked, but let's say we begin to fall for it. Let's say there's a phishing attack and we go, we click really fast cause we're all panicked. We type in our password and they're like, oh wait, I think I just gave my password to a shady site. What do you do once you're compromised in some way?

  • It's a great question, Sal. Now this is really unfortunate. We hope this doesn't happen to folks, but if it does, there are a few steps you can take to help mitigate the fallout from this kind of phishing attack. You should immediately tell a trusted adult, a teacher, or a parent, and let them know that this happened to you.

This will also help them make others aware that if they are hearing from you on that account that's been compromised, so that other folks don't fall into the same hands of the scammer. This will also help you take steps to report the scam if possible.

So, for example, if you're using Gmail, there is a reporting tool within your email. Oftentimes you can get alerts on your phone if there are phone calls that look like a scam, but there are also ways that you can report that. So definitely work with a trusted adult if you think that this has happened to you.

And then once you've kind of mitigated the fallout from that, you can look at best practices to make sure that that password isn't compromised in other places. So you are going to want to update that password, enroll in two-step verification as we talked about, and make sure that on a regular basis you're changing your password.

So even if this happens to you and you weren't made aware, you can actually mitigate some of that risk if you're updating and having strong passwords on a frequent basis. There's another nifty tool called Security Checkup that can actually help you check on your passwords for all of your accounts where you use your email to log in. And that helps you keep track and make sure that you know your passwords aren't outdated or, you know, worst case scenario that they haven't been breached in some kind of data breach or a phishing attempt.

  • Super, super useful.

More Articles

View All
Heaven on Earth | The Story of God
NARRATOR: The Hindu god Vishnu is the protector of creation, and Angkor Wat was built for him. Inside the temple are over 12,000 square feet of intricately carved reliefs. One relief was created to link King Suryavarman II to Vishnu himself. Look, you can…
Day In The Life of a Millennial Millionaire
What’s up guys, it’s Graham here! So this is a video that I’ve been meaning to make for over two years now because so many of you guys have asked me to film a day in the lifestyle vlog. Well, I guess now is the perfect time to film that video because with…
Elon Musk $5 million donation to Khan Academy thank you
Hi everyone, Sal Khan here from Khan Academy, and I just wanted to give a huge shout out and thank you to Elon Musk and everyone at the Musk Foundation for their incredibly generous support for Khan Academy. They just recently gave a 5 million dollar don…
Hanging out with a monitor lizard | Primal Survivor: Extreme African Safari
There’s a monitor lizard right there, right on that termite mound, just basking in the sun. They can either play dead or they can run like grease lightning. Let me see if I can get a better look at it. I can see that this monitor could use a little hel…
Price elasticity of supply determinants | APⓇ Microeconomics | Khan Academy
In several videos, we have talked already about the price elasticity of supply. In this video, we’re going to dig a little bit deeper, and we’re going to think about what factors might make a supply curve, or supply schedule, or portions of it to be more …
Existence theorems intro | Existence theorems | AP Calculus AB | Khan Academy
What we’re going to talk about in this video are three theorems that are sometimes collectively known as existence theorems. So the first that we’re going to talk about is the intermediate value theorem, and the common thread here, all of the existence t…