Tuesday, January 7, 2025

The way to inform in case your on-line accounts have been hacked

Hackers are increasingly targeting ordinary individuals in an attempt to steal their cryptocurrencies and potentially gain access to their financial institution accounts. While such assaults are relatively rare, it’s reasonable to exercise caution. It’s crucial to understand how to protect yourself if someone has compromised your email or social media accounts, assuming they suspect such an intrusion.

Years ago, companies began providing tools to help individuals protect themselves against potential threats and stay informed about the security of their online accounts. 

Across various online platforms, you’ll discover numerous capabilities at your fingertips. 

While identical to earlier information, there exists a crucial caveat. While implementing these strategies may provide a sense of security, it’s essential to recognize that they do not offer a guarantee against potential breaches. If you’re still unsure, consider consulting an expert, especially if you’re a journalist, dissident, or activist, or someone with a heightened risk of being targeted. When joining forces with Entry Now, a non-profit organization, you’ll have access to their team of expert consultants.

Make a habit of securing all your accounts, if not all of them, then at the very minimum, the most important ones such as email, banking, and social media. Can you learn to enable multi-factor authentication across more than 1,000 websites? You’re under no obligation to utilize the multi-factor authentication app featured on this site. 

Many online companies now offer the use of a physical security key or authenticator, which is one of the most effective safeguards against phishing attacks.

Gmail reveals a comprehensive list of locations where your account has been active.

To immediately address concerns about unauthorized access to your Gmail account and associated Google services, begin by scrolling to the bottom of your inbox and locating the “Recent account activity” section on the right-hand side.

Upon clicking on “Particulars,” a pop-up window will appear resembling this: 

A list of recent account activity on Google's account page, including IP addresses and browser types.
Current Account Exercises: A Snapshot on Google’s Account Webpage TechCrunch

Below are all the places where your Google account is currently active. If you’re unfamiliar with someone or the place they come from, such as a rural area you’ve not recently or never visited, then click “Safety Checkup.” Here, you can view the devices your Google account is actively using.   

Google's Security Checkup Page, including a view that shows "where you're signed in."
Google’s Safety Checkup webpage, accompanied by a view displaying the location where users are currently signed in, according to TechCrunch.

On scrolling down, you will likely come across “Latest safety exercise”.

a screenshot of recent security activity on Google's Security Checkup Page
The latest safety exercise on Google’s Safety Checkup webpage allows users to assess and improve their digital safety habits, providing a comprehensive review of online behaviors, settings, and security measures across various devices and platforms. TechCrunch

Do a test run of the gadget checklist to identify any devices that fail to register? If you notice anything unusual at any point during this process, immediately click on the link to “Report a suspicious activity” and change your password instantly.

a dialog window that says "Let's secure your account," which lets the user change their password.
Altering your Google account password. TechCrunch

After modifying your password, you may be signed out of each device at each location, except for those devices you use to verify your identity when signing in, as well as select devices authorized by third-party apps. If you want to explore investment opportunities or signal your interest in the market, simply click on the link to “View the apps and companies with third-party access.”

a screenshot showing a Google help page describing common questions about account access.
Protecting Your Google Account from Unauthorized Access: Removing Third-Party Entries TechCrunch

Lastly, we suggest considering enabling the. This enhanced security feature makes phishing attempts to obtain your password and hacking into your Google account even more difficult. The downside is that you need to invest in additional security measures, such as hardware-based tokens or biometric authentication devices, which provide an extra layer of verification beyond traditional passwords. However, we believe that predicting one’s future is crucial and an absolute necessity for individuals who are at greater risk. 

As you access your email, beware that it’s likely connected to multiple essential accounts, making it a potential entry point for hackers to breach those accounts as well. That’s why securing your email account is crucially important compared to almost any other account.

Outlook and Microsoft login credentials are stored in account settings.

If you’re concerned that hackers have gained access to your Microsoft Outlook account, you can check “where and when you’ve signed in” under account settings, as Microsoft suggests.

To access this webpage, navigate to and select the “Safety” option from the left-hand menu. Then, under “Sign-up exercise,” choose the relevant link. 

a sign-in activity checker window for MIcrosoft accounts.
Verifying current sign-in activity within your Microsoft account. TechCrunch

Here are the login details displayed on the webpage: The current logins section provides real-time information about who is currently logged in, including their platform, machine, browser type, and IP address.  

a screenshot showing recent activity, including device, platform and approximate location of the user
Verifying your ongoing workout progress within your Microsoft profile. TechCrunch

If something seems amiss, click on “Settings” where you can update your password, explore other features, and more?  

Microsoft additionally has .

Your email account is the linchpin of online security, as it’s virtually certain that most of your critical accounts – including social media, bank, and healthcare providers, among others – — are linked to it. Hackers’ primary objective is often to gain access to multiple accounts. 

Similar to various email providers, Yahoo also offers a tool to simulate sign-ins and testing exercises for accounts, allowing users to detect and investigate unusual activities that could indicate potential compromises. 

To access this software, navigate to our website or click on the icon located next to the email icon in the top-right corner of the screen, then select “Manage Your Account.” 

a screenshot showing the "manage your account" section of your Yahoo account.
Accessing your Yahoo account data. TechCrunch

Upon arrival, select the “” option on this webpage, where you can view the current exercises in your account, along with password updates, added phone numbers, and information on devices linked to your account, including their corresponding IP addresses. 

a recent activity window for Yahoo account users, which includes a log of recent account actions, such as password changes.
Verifying current account activity within my Yahoo account. TechCrunch
another screenshot showing Yahoo account activity, including browser version, location and sign-in history
Verifying my current account details within the Yahoo platform. TechCrunch

Since it’s a certainty that you’ve connected your email address to sensitive websites like financial institutions, social media platforms, and healthcare portals, among others, you must take extra measures to secure it. 

Ensure your Apple ID remains secure by implementing robust password management practices.

Do you frequently use public Wi-Fi networks? If so, activate the two-factor authentication (2FA) feature to significantly strengthen the security of your account. Additionally, consider utilizing a reputable password manager to generate and store unique, complex passwords for all accounts, including your Apple ID.

To safeguard your Apple ID, adhere to these best practices:

• Use a strong, distinctive password comprising upper-case letters, numbers, and special characters.
• Avoid using easily guessable information such as names, birthdays, or common words.
• Never share your login credentials with anyone, no matter the circumstances.

Apple allows you to check which devices are currently signed in with your Apple ID through the iPhone and Mac system settings. 

On your iPhone or iPad, navigate to the “Settings” app, then tap your name at the top, followed by scrolling down to view a comprehensive list of devices currently signed in under your account. 

a screenshot on an iPhone showing all the logged in devices on an Apple account.
What devices are currently linked to my Apple account? Apple

On a Mac, click the Apple logo in the top-left corner, followed by “System Preferences.” Next, select “General” and navigate to your name at the top of the window. Here, you’ll find a list of devices similar to those found on an iPhone or iPad. 

A screenshot on a Mac showing all the logged in devices on an Apple account.
What devices are currently signed in to my Apple account? Apple

When clicking on a specific Mac, Apple allows you to “view that machine’s details,” which include the machine model, serial number, and operating system version.

When using a Windows device, access Apple’s iCloud app to see which devices are currently signed in to your account. Click on the app to access your account, then select “Manage Apple ID” to view a list of registered devices and gain further insights into their status.

You can also obtain this information online by visiting the website and navigating to the “Gadgets” section in the menu on the left. 

A screenshot on a browser view showing all the logged in devices on an Apple account.
Devices connected to my Apple account are displayed on this screen, showcasing all the devices I’ve linked to my login. Apple

Is your social media presence vulnerable to hackers?

To safeguard your Facebook and Instagram accounts, we recommend implementing these best practices:
Firstly, ensure you’ve activated two-factor authentication on both platforms. This adds an extra layer of security by requiring a unique code sent to your phone in addition to your login credentials when logging in from unfamiliar devices or locations.

The social networking giant offers a feature enabling users to access their account’s login locations. Navigate to Facebook’s “Settings” page and select the option labeled “Where You’re Logged In”. 

a screenshot of a logged-in Facebook account Account login activity showing recently and all signed in devices attached to that account.
Are you ready to login to your Facebook account? First, make sure you’re on the correct Facebook page – www.facebook.com. Next, click the “Login” button in the top right corner of the screen. This will take you to the login form where you can enter your email address or phone number and password. TechCrunch

As long as you have your Instagram account connected to your Facebook account, you can easily access and view them from the same interface. If the accounts are not linked, or if you don’t have a Facebook account to manage your Instagram account, navigate to Settings > Password and Security > Where You’re Logged In. 

You can choose to log out from specific devices, perhaps because you no longer recognize them or due to the fact that they’re outdated devices you no longer use. 

Facebook offers a robust function, much like Google’s approach, designed to significantly strengthen the security of its user accounts by making it substantially more difficult for malicious hackers to gain unauthorized access. To strengthen security, we will implement more stringent authentication protocols upon login, thereby significantly reducing the likelihood of unauthorized access to your personal account. “If an unusual activity is detected on your account, we’ll require additional verification to confirm your identity.” 

For individuals who occupy high-risk professions, such as journalists, politicians, or those in sensitive roles, it is crucial to consider enabling this feature for enhanced security against potential hacking threats. 

Your WhatsApp account is secure if you have a lock screen.

Prior to this, WhatsApp functionality was limited to a single mobile device usage only. Meta now enables WhatsApp users to access the app on computer systems and instantly through their browsers. 

Logging in to a place using your WhatsApp account is a seamless process. Launch the WhatsApp messaging application on your mobile device. On your iPhone or iPad, navigate to the Settings app in the bottom right corner, and select “Linked Devices”. 

Here: It’s possible to view an inventory of gadgets, and by clicking on any of them, you can log them out directly. 

a screenshot showing all the linked devices attached to this WhatsApp account
Verifying connected devices on a WhatsApp profile. TechCrunch
another screenshot showing the linked devices attached to this WhatsApp account
Verifying connected devices on a WhatsApp profile. TechCrunch

On Android devices, navigate to the top-right corner of the WhatsApp app and tap the three dots, followed by “Linked devices,” which displays a webpage resembling the one found on Apple devices.

The sign enables real-time anomaly detection, allowing for swift identification and investigation of irregularities.

Now, like WhatsApp, Signal allows seamless access on macOS, Windows, and Linux platforms. 

a screenshot on an iPhone showing all the linked devices attached to this Signal account
Seeking devices connected to a Google Sign account. TechCrunch

On this Linked Devices display, tapping the “Edit” button allows for the removal of devices, resulting in account logout and disconnection from linked devices. 

SKIP

To access the place where you may be logged into X (formerly Twitter), follow these steps: Navigate to your profile page, select “Extra” from the left-hand menu, proceed to “Settings and privacy,” click on “Security and account access,” and finally, choose “Apps and sessions.”

On this menu, you can view the apps linked to your X account, track active sessions (where you’re currently logged in), and review your account’s activity history. 

You can revoke access to all devices and locations by clicking the “Sign out of all other sessions” button.

a screenshot showing all the logged in sessions on an X account from the web interface
Attempting to access logged-in sessions on an X account? TechCrunch
a screenshot showing all the account access history on an X account from the web interface
Reviewing the account entry history on this specific X account. TechCrunch

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles