yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Wait have I just been attacked? What do I do now?


2m read
·Nov 10, 2024

  • All right, Grace. So ideally we can recognize when we are attacked, but let's say we begin to fall for it. Let's say there's a phishing attack and we go, we click really fast cause we're all panicked. We type in our password and they're like, oh wait, I think I just gave my password to a shady site. What do you do once you're compromised in some way?

  • It's a great question, Sal. Now this is really unfortunate. We hope this doesn't happen to folks, but if it does, there are a few steps you can take to help mitigate the fallout from this kind of phishing attack. You should immediately tell a trusted adult, a teacher, or a parent, and let them know that this happened to you.

This will also help them make others aware that if they are hearing from you on that account that's been compromised, so that other folks don't fall into the same hands of the scammer. This will also help you take steps to report the scam if possible.

So, for example, if you're using Gmail, there is a reporting tool within your email. Oftentimes you can get alerts on your phone if there are phone calls that look like a scam, but there are also ways that you can report that. So definitely work with a trusted adult if you think that this has happened to you.

And then once you've kind of mitigated the fallout from that, you can look at best practices to make sure that that password isn't compromised in other places. So you are going to want to update that password, enroll in two-step verification as we talked about, and make sure that on a regular basis you're changing your password.

So even if this happens to you and you weren't made aware, you can actually mitigate some of that risk if you're updating and having strong passwords on a frequent basis. There's another nifty tool called Security Checkup that can actually help you check on your passwords for all of your accounts where you use your email to log in. And that helps you keep track and make sure that you know your passwords aren't outdated or, you know, worst case scenario that they haven't been breached in some kind of data breach or a phishing attempt.

  • Super, super useful.

More Articles

View All
Population growth rate based on birth and death rates | Ecology | AP Biology | Khan Academy
When you take an AP Biology exam, it is likely that it will include a formula sheet that will include formulas like this on it. It can be a little bit intimidating at first because we’re not used to seeing formulas like this that involve—in fact, this is …
Worked example: Interpreting potential energy curves of diatomic molecules | Khan Academy
In a previous video, we began to think about potential energy as a function of internuclear distance for diatomic molecules. What do I mean by diatomic molecules? Well, we looked at molecular hydrogen, which is just H₂, which is just two hydrogens covalen…
Into the Snow Storm: Checking for Predators | Life Below Zero
♪ I turn on all of my lights here. Other than the brush right there, I’m driving in a milk bottle. If this gets any worse, I’m done. So, what I’m gonna do is try to pick my way back, following my tracks. The wind and the snow is just filling them in as ra…
The Gulf Stream Explained
The ocean conveyor belt and the Gulf Stream. Ocean currents have a direct influence on our lives. They determine our weather, our climate, and much more. The ocean currents and wind systems transport heat from the equator to the poles and operate like a l…
Johnnie Walker Step Inside: The Ultimate Way To Travel
We travel a lot. We’re traveling to races a lot of the time. You have to fly privately. It does give you that buzz. When I first got to ride on a private jet, I couldn’t believe it. The luxury that you get is a couple of ways to travel. Every time I step…
The Dark Side of Everyday Things | Why We Can't Have Nice Things Anymore
to participate in viral challenges popularized by the platform. These incidents underline a disturbing trend: social media platforms, particularly TikTok, have the potential to influence vulnerable users, especially children, into engaging in dangerous b…