yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Wait have I just been attacked? What do I do now?


2m read
·Nov 10, 2024

  • All right, Grace. So ideally we can recognize when we are attacked, but let's say we begin to fall for it. Let's say there's a phishing attack and we go, we click really fast cause we're all panicked. We type in our password and they're like, oh wait, I think I just gave my password to a shady site. What do you do once you're compromised in some way?

  • It's a great question, Sal. Now this is really unfortunate. We hope this doesn't happen to folks, but if it does, there are a few steps you can take to help mitigate the fallout from this kind of phishing attack. You should immediately tell a trusted adult, a teacher, or a parent, and let them know that this happened to you.

This will also help them make others aware that if they are hearing from you on that account that's been compromised, so that other folks don't fall into the same hands of the scammer. This will also help you take steps to report the scam if possible.

So, for example, if you're using Gmail, there is a reporting tool within your email. Oftentimes you can get alerts on your phone if there are phone calls that look like a scam, but there are also ways that you can report that. So definitely work with a trusted adult if you think that this has happened to you.

And then once you've kind of mitigated the fallout from that, you can look at best practices to make sure that that password isn't compromised in other places. So you are going to want to update that password, enroll in two-step verification as we talked about, and make sure that on a regular basis you're changing your password.

So even if this happens to you and you weren't made aware, you can actually mitigate some of that risk if you're updating and having strong passwords on a frequent basis. There's another nifty tool called Security Checkup that can actually help you check on your passwords for all of your accounts where you use your email to log in. And that helps you keep track and make sure that you know your passwords aren't outdated or, you know, worst case scenario that they haven't been breached in some kind of data breach or a phishing attempt.

  • Super, super useful.

More Articles

View All
Metric system unit conversion examples
Tomas dropped off two packages to be shipped. One package weighed 1.38 kg and the other package weighed 720 g. So the first one they given in kilograms and the second one they give us in grams. What was the combined weight of both packages in grams? So w…
Ice Breakers - Ep. 1 | National Geographic Presents: IMPACT With Gal Gadot
GAL: “I want them to feel like they don’t have to conceal what they love or who they are to conform.” This is Kameryn’s wish for the girls she coaches as a figure skater and life role model, as she reminds them to always embrace their beauty, their joy, a…
Nonrenewable Energy Resources| AP Environmental science| Khan Academy
Today, let’s talk about energy resources. You’ve probably already done something today that used energy resources, even beginning from the moment you woke up. For me, the beginning of my day always starts with making tea. I use energy in every step of thi…
Khan Academy for Texas Administrators Webinar 7.18.2024
Hello everyone! Welcome! Thank you for joining. We are going to get started in about 10 seconds. There are a lot of people pouring into the room, so you are here to see what Khan Academy has done to support Texas teachers. We’re so excited to be addressin…
Comparing decimals example
So we have four numbers listed here. What I would like you to do is get out some pencil and paper and pause this video. See if you can order these numbers from least to greatest. So the least would be at the left and then keep going greater and greater un…
Intermediate value theorem example | Existence theorems | AP Calculus AB | Khan Academy
Let F be a continuous function on the closed interval from -2 to 1, where F of -2 is equal to 3 and F of 1 is equal to 6. Which of the following is guaranteed by the intermediate value theorem? So before I even look at this, what do we know about the int…