Saturday, December 14, 2024

Changes are made to secure online presence after hacking incidents: Immediately notify your bank’s fraud department of any unauthorized transactions or suspicious activity on your accounts.

Hackers are increasingly targeting average individuals with the aim of stealing their cryptocurrency and potentially compromising their bank accounts. While a significant proportion of these assaults are relatively rare, there is still no need to sound the alarm. It’s crucial to understand how to protect yourself when someone may have accessed your email or social media account, having compromised your security.

Several years ago, companies began offering tools to help individuals protect themselves and their online presence. Many corporations, including those with whom you may have an account, now provide instruments that enable you to take control of your accounts’ security, often before you even need to contact them for assistance in certain situations. 

On various online platforms, we’ll explore the multitude of capabilities at your disposal. 

While identical to within the earlier information, there is a crucial caveat. These strategies do not guarantee that you have not been compromised. If uncertain, it is crucial to seek advice from a professional, especially for journalists, dissenters, activists, or others with a higher risk of being targeted. When circumstances permit, the nonprofit organization Entry Now offers the opportunity to collaborate with one of their experienced consultants.

For those who don’t prioritize this aspect already, consider securing all accounts – at the very least, critical ones such as electronic mail, banking, and social media. This tutorial teaches you techniques to enable multi-factor authentication on over 1,000 websites. You’re under no obligation to employ the multifactor authentication application advertised on that website. 

Providers now increasingly offer physical security keys, which provide one of the most robust safeguards against phishing.

Gmail tracks all the places where your account is currently active.

When you suspect someone has compromised your Gmail account, and subsequently other linked Google services, start by scrolling to the bottom of your inbox until you locate “Last account activity” in the lower right corner.

Upon clicking on “Particulars,” a pop-up window emerges with the following appearance: 

A list of recent account activity on Google's account page, including IP addresses and browser types.
A comprehensive list of recent transactions and activities within a Google account dashboard. TechCrunch

All of these places actively use your Google account? If you’re unsure about one of them, such as an unfamiliar location, like a rural area you’ve never visited recently or ever, then click on “Safety Checkup.” Here, you can review the devices where your Google account is active.   

Google's Security Checkup Page, including a view that shows "where you're signed in."
Google’s Safety Checkup webpage, featuring a view that displays “the account you’re currently signed into,” according to TechCrunch.

If you scroll down, you’ll likely come across the latest information on our safety exercises.

a screenshot of recent security activity on Google's Security Checkup Page
Google’s Latest Safety Exercise: A Comprehensive Review of the Safety Checkup Web Page TechCrunch

Test this checklist to determine if there are any gadgets that you simply do not recognize. If you notice anything unusual at any point along the process, simply click on the “Review new exercise?” prompt and update your password immediately.

a dialog window that says "Let's secure your account," which lets the user change their password.
Altering your Google account password. TechCrunch

After modifying your password, you may be signed out of each machine in every location, except for those devices you use to verify your identity when signing in, as well as a few devices with third-party apps that you’ve granted access to. If you want to trade on the market or signal, simply click on the link to “View the apps and providers offering third-party access.”

a screenshot showing a Google help page describing common questions about account access.
Removing unauthorized access to your Google account. TechCrunch

Lastly, we suggest considering enabling. This enhanced security feature makes phishing for your password and hacking into your Google account even more difficult. The potential drawback lies in the recommendation to acquire supplementary security measures, specifically hardware-based products capable of providing an additional layer of authentication through two-factor functionality. While emergency response systems are crucial, they should be readily accessible to anyone facing imminent peril. 

Since you haven’t logged into your email account in a while, be cautious: linking it to other crucial accounts can create an entry point for hackers, potentially compromising multiple accounts with just one compromised login. That’s why securing your electronic mail account is particularly crucial compared to most others.

Outlook and Microsoft login credentials are stored within the account settings.

If concerns arise regarding unauthorized access to your Microsoft Outlook account by hackers, review “sign-in history” under account settings to track “where and when you’ve signed in.”

To access the webpage’s safety guidelines, navigate to and select “Safety” from the left-hand menu. Then, under “Sign-up exercise”, choose “Policy”. 

a sign-in activity checker window for MIcrosoft accounts.
Are you checking the most recent login activity in your Microsoft account? TechCrunch

Here’s a revised version of the original text: To access sensitive information at this level, you require visibility into recent login activity, including the specific web page accessed, the platforms and machines utilized for logging in, the types of browsers employed, as well as the corresponding IP handles.  

a screenshot showing recent activity, including device, platform and approximate location of the user
Verifying the most recent exercise activity within your Microsoft account settings. TechCrunch

If something appears amiss, click on the “” icon to access your password-changing options, review the “” section for further instructions.  

Microsoft additionally has .

Your email account serves as the foundation of online security, as it appears to be the gateway to most of your crucial accounts – including social media, financial institutions, healthcare providers, and others. — are linked to it. Hackers often strive to gain initial access through password cracking as a means to subsequently breach multiple accounts. 

Preserve your LinkedIn account with strict access controls, limiting visibility to approved connections and ensuring that sensitive information remains private.

If you’re concerned about the security of your LinkedIn account, visit our dedicated help webpage for guidance on identifying and removing unfamiliar login sessions from various platforms, including internet tools, iOS devices, and Android apps. 

On LinkedIn, you can view your current login location.

a screenshot showing active sessions of all logged-in LinkedIn accounts, including a button that says "end these sessions" to log everyone out.
Here’s a comprehensive display showing all the websites currently linked to your LinkedIn profile. TechCrunch

To complete the session without saving changes, click “Finish” and authenticate with your password upon request. If you inadvertently click on “Finish these periods,” you will likely log out of all devices except the one you’re currently using. 

The method is identical across both iOS and Android platforms. Within the LinkedIn app, faucet in your profile image on the highest, faucet on “Settings,” then “Check in & Safety,” then “The place you’re signed in.” At that time you will note a web page that’s primarily an identical to the one you possibly can see on the internet. 

LinkedIn also features a security mechanism that prompts users to authenticate their login attempt on another device when someone attempts to access their account from an unfamiliar location. 

a push notiifcation on an iPhone requesting attention to a LinkedIn sign-in request
A notification indicating a new request for connection on my LinkedIn profile, displayed on the screen of my iPhone. TechCrunch

When you tap the sign-in request notification, you’ll be taken to a webpage that prompts you to verify your identity and confirm that you’re the one attempting to log in. You can either verify a login attempt or block subsequent attempts. 

You’ve received a sign-in request from [Name] on [Date]. This is an automated notification to inform you that [Name] has attempted to connect with their computer to your device, requesting permission to access specific files or folders. If you’re familiar with [Name], feel free to approve the request; otherwise, you may want to verify the authenticity of this connection before granting access. TechCrunch

Like various email providers, including those operated by Yahoo, which also owns TechCrunch, this platform offers a tool to scrutinize your account activity and sign-in behavior, allowing users to detect any unusual patterns or suspicious signs of potential compromise. 

To access this instrument, navigate to the top right corner of the page, where you’ll find the email icon followed by a “Manage your account” link. Clicking on this will allow you to proceed with entry. 

a screenshot showing recent activity, including device, platform and approximate location of the user
Accessing your Yahoo account info. TechCrunch

Upon arrival, click on the “Account” tab, where you can view your latest activity, including password updates, phone numbers linked, devices associated with your account, along with their respective IP addresses, allowing for seamless management and monitoring of your online presence. 

a recent activity window for Yahoo account users, which includes a log of recent account actions, such as password changes.
Verifying recent account activity within my Yahoo account? TechCrunch
another screenshot showing Yahoo account activity, including browser version, location and sign-in history
Verifying recent activity in your Yahoo account for added security. TechCrunch

Since it appears you’ve linked your email address to sensitive websites such as your bank, social media accounts, and healthcare portals, among others, it’s crucial that you take extra precautions to secure it. 

Protect your digital life: Ensure your Apple ID is rock-solid

The devices signed into your Apple ID can be viewed directly through the iPhone and Mac system settings, it appears. 

On an iOS device, navigate to the “Settings” app, tap your name at the top, and then scroll down to view a list of all devices where you’re currently signed in. 

a screenshot on an iPhone showing all the logged in devices on an Apple account.
What devices are currently signed in to my Apple ID? This screenshot displays a comprehensive list of all the devices I’ve used with this account. Apple

On a Mac, navigate to the top-left corner and click the Apple icon, followed by “System Preferences,” then select “General” from the sidebar and click on your name at the top. You’ll then be presented with a list of devices, similar to those found on an iPhone or iPad. 

A screenshot on a Mac showing all the logged in devices on an Apple account.
The Devices list for my Apple account: a comprehensive visual representation of all the devices currently logged in and associated with my profile. Apple

When clicking on a Mac, Apple allows you to “view that machine’s information,” including its model number, serial number, and operating system version.

On Windows, access Apple’s iCloud app to view the devices currently logged in to your account. Open the app and navigate to “Manage Apple ID,” where you can view your devices and access additional information about each one.

You can easily obtain this information online by visiting the relevant website and selecting the “Units” option from the menu located in the top-left corner of the page. 

A screenshot on a browser view showing all the logged in devices on an Apple account.
A visual representation showcasing the entirety of devices associated with an authenticated Apple account within a browser’s viewport. Apple

Are you worried about your online security? Here are some easy ways to ensure Facebook and Instagram safety:

To begin with, regularly check your privacy settings on both platforms. This will prevent unwanted sharing of your personal information. Next, be cautious when clicking on links or downloading attachments from unfamiliar accounts.

Another simple yet effective method is to use strong passwords and enable two-factor authentication. This will make it much harder for hackers to access your accounts.

Also, limit the amount of personal information you share publicly. This includes your hometown, phone number, and email address. Remember, once shared online, it’s difficult to take back.

Use a reputable antivirus software on your device to protect against malware and other cyber threats. Finally, report any suspicious activity or content to Facebook and Instagram directly.

By following these simple steps, you can significantly reduce the risk of falling victim to cybercrime and enjoy a safer online experience.

The social media giant introduces a feature that enables users to view the platforms where their account is currently logged in. Access Facebook’s “Settings” menu, then click on the option labeled “Where You’re Logged In”. 

a screenshot of a logged-in Facebook account Account login activity showing recently and all signed in devices attached to that account.
To access your Facebook account, follow these steps:

1. Go to the Facebook homepage and click on the “Log In” button located at the top right corner of the page.
2. Enter your email address or phone number in the first field and your password in the second field.
3. Click the “Log In” button to proceed.
4. If you’re using a public computer, you may be prompted to enter additional information for security purposes.

That’s it! You should now have access to your Facebook account. TechCrunch

If you’re logged into both platforms simultaneously, you’ll also see the location where you’ve signed in alongside your connected Facebook account. If your accounts aren’t linked or if you don’t have a Facebook account, follow these steps: Log in to your Instagram account, navigate to Settings > Account > Login Information, then select “Where You’re Logged In” from the Password and Security section. 

You can opt to disconnect from specific devices, either because you’re unaware of them or due to the fact that they’re outdated devices no longer in use. 

Facebook introduces a new feature designed to significantly enhance the security of its platform, making it much more difficult for malicious hackers to gain unauthorized access to user accounts. To strengthen security and prevent unauthorised access to accounts, we’re introducing tighter login protocols that significantly reduce the risk of breach attempts. “When an unusual activity is detected on your account, we’ll require you to complete further verification steps to ensure it’s really you logging in.” 

If you’re a high-profile individual such as a journalist, politician, or someone with significant public influence, you may want to consider enabling this feature for added security against potential hacking threats. 

Does your WhatsApp account have a lock? If yes, then your WhatsApp is secure.

In the past, the sole possibility existed to utilize WhatsApp on a single mobile device alone. Meta now enables WhatsApp users to access the app seamlessly on computer systems and also directly via browser. 

Logging into the place using your linked WhatsApp account is a seamless process. Launch the WhatsApp messaging application on your mobile device. Tap the Settings app in the bottom right corner of your iPhone or iPad, followed by selecting “Connected Devices.” 

Here: You can view an inventory of gadgets and log one out by clicking on it. 

a screenshot showing all the linked devices attached to this WhatsApp account
Verifying connected devices on a WhatsApp profile. TechCrunch
another screenshot showing the linked devices attached to this WhatsApp account
Verifying connected devices on a WhatsApp profile. TechCrunch

On your Android device, navigate to the WhatsApp app’s top-right corner and select the three-dot icon. From there, choose “Linked devices” to access a webpage displaying settings comparable to those found on Apple devices.

The sign-up process allows for anomaly detection.

Sign now lets you use the app on macOS, Windows, and Linux platforms. 

a screenshot on an iPhone showing all the linked devices attached to this Signal account
Searching for devices connected to a Slack account. TechCrunch

By clicking on “Edit,” you can select to remove linked devices, resulting in automatic logout and disconnection from those devices. 

Does X permit users to view available time slots?

To access the account information you’re currently logged into, formerly known as X (Twitter), follow these steps: Navigate to , click on the “Extra” option in the left-hand menu, select “Settings and privacy,” proceed to “Safety and account access,” and finally, click on “Apps and permissions.”

On this menu, you can view associated apps tied to your X account, identify currently accessible timeframes (mirroring the login location), and review your account’s activity history. 

You’ll be able to log out of all connected devices and areas simultaneously by clicking the “Log off all other sessions” button.

a screenshot showing all the logged in sessions on an X account from the web interface
Attempting to log in during specific time frames on my X account. TechCrunch
a screenshot showing all the account access history on an X account from the web interface
Reviewing the account entry history of an X account. TechCrunch

Securing your Snap account

Snap’s login functionality includes a feature that allows users to inspect their current login location. A Snapchat to examine. Utilize both the app on iOS and Android devices. 

On both iOS and Android devices, navigate to the app by opening it, tapping your profile icon, followed by the settings (gear) icon, and then select “Session Administration” from the menu. This will allow you to view a list of active sessions associated with your account. It seems like this:

a screenshot user session management in Snapchat's iOS app, showing all the places where users are logged in
A vulnerability in Snap’s iOS app allows for session administration to be discovered. TechCrunch

To access session administration online, navigate to the designated website and click on the “Session Administration” tab. You’ll then be presented with a list of logged-in sessions resembling the image below. You can flag suspicious posts on both the internet and within the app if they appear unverified or unknown to you. 

Snapchat also features a security mechanism that notifies your phone if someone attempts to access your account, whether it’s you or an unauthorized individual trying to log in. 

a screenshot showing sign-in request notification on a Snap account set up on an iPhone.
You receive an indication-in request notification on your Snapchat account arranged on an iPhone. TechCrunch

TechCrunch tested the sign-in process on a variety of devices. This notification was not displayed to users who logged back in to a tool they had previously accessed. When Snapchat deems a login attempt “suspicious”, typically due to unusual device or IP address usage, the app prompts the user to verify their phone number associated with the account, displaying only the last four digits of the phone number for security purposes.

When an unauthorized individual attempts to log in and taps “Proceed,” the account owner receives a text message on their phone number with a verification code, thereby preventing the would-be intruder from gaining access. 

You will receive this alert only once the individual has successfully entered their correct password. To guarantee optimal security, it’s essential to set a robust and unique password that’s resilient against guessing attempts; this can be achieved by utilizing a lengthy and complex password, thereby preventing unauthorized access. Additionally, you can enable multi-factor authentication using an authenticator app instead of relying on your mobile phone number. 

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles