{"id":2813,"date":"2024-07-17T17:19:48","date_gmt":"2024-07-17T17:19:48","guid":{"rendered":"https:\/\/howtogeek.blog\/pt\/?p=2813"},"modified":"2024-07-17T17:19:48","modified_gmt":"2024-07-17T17:19:48","slug":"how-to-tell-if-your-online-accounts-have-been-hacked-pt","status":"publish","type":"post","link":"https:\/\/howtogeek.blog\/pt\/how-to-tell-if-your-online-accounts-have-been-hacked-pt\/","title":{"rendered":"How to tell if your online accounts have been hacked"},"content":{"rendered":"<h2 id=\"signs-youve-been-hacked\">Signs you\u2019ve been hacked<\/h2>\n<ul>\n<li>You\u2019ve been logged out of your account. <\/li>\n<li>You find logins from devices or locations that you don\u2019t recognize in your account activity.<\/li>\n<li>You received emails or text messages for login attempts, password resets, or 2FA codes that you didn\u2019t request. <\/li>\n<li>You\u2019ve received security emails from the service about account activity you don\u2019t recognize.<\/li>\n<li>Your sent folder has emails that you didn\u2019t send.<\/li>\n<li>There are purchases in your account that you don\u2019t recognize or you see unauthorized charges in your linked payment method.<\/li>\n<li>The data in your account is altered or missing.<\/li>\n<li>Your contacts are receiving strange emails or messages from you in email or social media accounts.<\/li>\n<li>There are posts on your social media you didn\u2019t make.<\/li>\n<li>There are unusual changes in your account settings like updated recovery information.<\/li>\n<li>Your emails are automatically getting forwarded to an email address you don\u2019t recognize.<\/li>\n<li>New apps or extensions are connected to your account that you didn\u2019t authorize.<\/li>\n<li>Your account has been locked due to suspicious activity.<\/li>\n<li>You cannot log in to your account.<\/li>\n<\/ul>\n<p>If you think you\u2019ve been hacked, most popular online services have tools in place you can use to check for unusual activity and take further action if required. <\/p>\n<h2 id=\"google\">Google<\/h2>\n<p>Securing your Google account is important because it\u2019s linked to many websites and apps out there and can be used to hack into them as well. <\/p>\n<ul>\n<li>If you think someone can access your Google account, go to your Gmail account and scroll down to the bottom.<\/li>\n<li>Click on \u2018Details\u2019 below \u2018Last account activity\u2019.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"394\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/image-27-1.webp\" title=\"\" width=\"700\"\/><\/figure>\n<ul>\n<li>You\u2019ll be able to see all the places where your account is active. Click on \u2018Show details\u2019 to view more information about it. If you don\u2019t recognize a location, click on the \u2018Security Checkup\u2019 link to investigate it further.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"603\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/image-28-1-1.webp\" title=\"\" width=\"1073\"\/><\/figure>\n<ul>\n<li>Here, you can see the devices that have access to your account and remove any device you don\u2019t recognize or use anymore.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"736\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/image-29-1.webp\" title=\"\" width=\"1308\"\/><\/figure>\n<ul>\n<li>Next, go to the page for managing your Google account. <\/li>\n<li>Click on \u2018Security\u2019 from the left side. <\/li>\n<li>Then, go to \u2018Recent Security Activity\u2019 and check that there\u2019s no suspicious activity.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"713\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/Screenshot-2024-07-17-at-7.32.42-PM-1.webp\" title=\"\" width=\"1268\"\/><\/figure>\n<ul>\n<li>If you see one you don\u2019t recognize, click on it.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"668\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/Screenshot-2024-07-17-at-7.34.56-PM-1.webp\" title=\"\" width=\"1187\"\/><\/figure>\n<ul>\n<li>Then, click on \u2018No, secure account\u2019 on the next screen. <\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"615\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/Screenshot-2024-07-17-at-7.32.53-PM-1.webp\" title=\"\" width=\"1093\"\/><\/figure>\n<ul>\n<li>Follow the steps on the screen. Depending on the activity, this might be something as simple as revoking a service\u2019s access to your account or as drastic as changing your account password.<\/li>\n<li>When you change your password, you\u2019ll be signed out of every location, except on the device you use to verify it\u2019s you. <\/li>\n<li>You can also check the devices you can get the Google prompt on and your recovery phone numbers and emails from the Security settings to make sure that no one has altered that information.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"632\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/image-30-1.webp\" title=\"\" width=\"1123\"\/><\/figure>\n<ul>\n<li><strong>If you can\u2019t access your account <\/strong>in case someone has changed the password and recovery information, you\u2019ll need to go to the account recovery page and answer the questions to recover your account. <\/li>\n<\/ul>\n<p><strong>Things to remember:<\/strong><\/p>\n<ul>\n<li>If you have financial information saved in your Google account that has been compromised, for example, credit cards in Google Chrome or Google Pay, you should contact your bank and take the appropriate steps.<\/li>\n<li>If you also have other information or personal documents, like your passport, saved anywhere in your Google account such as Drive, Photos, etc., you should contact your local authorities and file a complaint. <\/li>\n<li>For users at higher risk of getting their accounts compromised, like journalists, politicians, human rights activists, etc., Google also offers an Advanced Protection Program that makes it difficult to get into someone\u2019s accounts. While previously, it required the use of a hardware key, Google has now expanded the program to work with Passkeys as well so you don\u2019t need to buy a hardware key if you don\u2019t want to.<\/li>\n<\/ul>\n<h2 id=\"apple-id\">Apple ID<\/h2>\n<p>You can check whether your Apple ID is safe relatively easily using your iPhone, iPad, or Mac. You can also access this information by going to appleid.apple.com from a web browser.<\/p>\n<ul>\n<li>On your iPhone, iPad, or Mac, open the Settings app.<\/li>\n<li>Then, tap your name at the top on your iPhone\/ iPad. On the Mac, click your name at the top of the left menu.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"402\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/image-31-1-1.webp\" title=\"\" width=\"715\"\/><\/figure>\n<ul>\n<li>Scroll down and you\u2019ll be able to see a list of all the devices where your Apple ID is logged in.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"402\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/image-32-1.webp\" title=\"\" width=\"715\"\/><\/figure>\n<ul>\n<li>You can tap on a device to see more information about it. If you don\u2019t recognize a device, tap on \u2018Remove from Account\u2019.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"402\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/image-33-1.webp\" title=\"\" width=\"715\"\/><\/figure>\n<ul>\n<li>You should also change your Apple ID password if an unrecognized device has access. <\/li>\n<li>If you can\u2019t access your account and are unable to reset the password as well, you can start the recovery process for your Apple ID by going to iforgot.apple.com.<\/li>\n<\/ul>\n<p><strong>Things to remember:<\/strong><\/p>\n<ul>\n<li>Set up two-factor authentication after securing your account if you haven\u2019t already.<\/li>\n<li>If you\u2019re using an email address from another provider with your Apple ID, say Google or Yahoo, make sure that that account is secure as well and only you have access to it. <\/li>\n<\/ul>\n<h2 id=\"yahoo\">Yahoo<\/h2>\n<p>Yahoo has similar tools to help you figure out where your account is active.<\/p>\n<ul>\n<li>Go to yahoo.com and sign in to your account. <\/li>\n<li>Hover over your profile picture and select \u2018Overview\u2019 from the menu to go to the account management screen. <\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"572\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/Screenshot-2024-07-17-at-7.58.18-PM-1-1.webp\" title=\"\" width=\"1016\"\/><\/figure>\n<ul>\n<li>Then, click on \u2018View connected devices\u2019 to see where your account is active.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"728\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/Screenshot-2024-07-17-at-8.01.33-PM-1.webp\" title=\"\" width=\"1295\"\/><\/figure>\n<ul>\n<li>Click on any activity you find suspicious to review it further. If you don\u2019t recognize it, change your password. This will sign you out from all other devices except the one you\u2019re using.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"783\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/Screenshot-2024-07-17-at-8.02.40-PM-1.webp\" title=\"\" width=\"1392\"\/><\/figure>\n<ul>\n<li>From the account management page, you can also click on \u2018Review Recent Activity\u2019.<\/li>\n<li>This will show any activity related to your account, like changes in passwords, recovery phone numbers or emails, etc. If you find any suspicious activity here, change your password. <\/li>\n<li>Then, go to \u2018Security\u2019. Here, review and remove any unsanctioned recovery emails, phone numbers, or devices.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"673\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/Screenshot-2024-07-17-at-8.04.57-PM-1.webp\" title=\"\" width=\"1197\"\/><\/figure>\n<h2 id=\"microsoft\">Microsoft<\/h2>\n<p>For your Microsoft or Outlook account, you can see your account activity by going to your account page.<\/p>\n<ul>\n<li>Go to microsoft.com and sign in to your account.<\/li>\n<li>Then, click on the Profile icon and go to \u2018My Microsoft account\u2019 from the menu. <\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"460\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/Screenshot-2024-07-17-at-8.06.42-PM-1.webp\" title=\"\" width=\"817\"\/><\/figure>\n<ul>\n<li>Go to \u2018Security\u2019 from the left menu. <\/li>\n<li>Next, click on \u2018View my sign-in activity\u2019 under the \u2018Manage how I sign in\u2019 option.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"624\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/Screenshot-2024-07-17-at-8.07.33-PM-1.webp\" title=\"\" width=\"1110\"\/><\/figure>\n<ul>\n<li>Here, you can see all sign-in attempts (successful and unsuccessful) to your account.<\/li>\n<li>With every sign-in attempt, you can expand it to view more information like the device and browser used and the IP address.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"726\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/image-34-1.webp\" title=\"\" width=\"1240\"\/><\/figure>\n<ul>\n<li>If you see any suspicious activity, click on \u2018Secure your account\u2019 to change your password. <\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"656\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/Screenshot-2024-07-17-at-8.13.57-PM-1.webp\" title=\"\" width=\"1166\"\/><\/figure>\n<h2 id=\"facebook-and-instagram\">Facebook and Instagram<\/h2>\n<p>Your social media accounts can also be hacked and result in disastrous consequences. Meta offers tools for its platforms so users can review their account activity. <\/p>\n<ul>\n<li>Open Facebook and go to <code>Settings and Privacy<\/code> &gt; <code>Settings<\/code> &gt; <code>Password and Security<\/code>.<\/li>\n<li>Then, click on \u2018Password and Security\u2019 once again. <\/li>\n<li>Next, click on \u2018Where you\u2019re logged in\u2019 under Security checks to see your account activity.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"672\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/Screenshot-2024-07-17-at-8.15.17-PM-1.webp\" title=\"\" width=\"1195\"\/><\/figure>\n<ul>\n<li>If your Facebook account is connected to Instagram, you\u2019ll be able to see the account activity for both platforms from here. Choose the platform you want to review the activity for.If your accounts are not connected or you don\u2019t have a Facebook account, you can access the same page from the \u2018Accounts Centre\u2019 of Instagram settings as well.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"685\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/Screenshot-2024-07-17-at-9.04.15-PM-1.webp\" title=\"\" width=\"1218\"\/><\/figure>\n<ul>\n<li>Then, click on the device to further review it. You can see the device name, location, and time of the login. Click on \u2018Log out\u2019 to log your account out from a device you don\u2019t recognize or no longer use. You can also set up alerts for when a device logs into your account.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img alt=\"\" class=\"wp-image\" decoding=\"async\" height=\"682\" loading=\"lazy\" src=\"https:\/\/cdn.howtogeek.blog\/wp-content\/uploads\/2024\/07\/Screenshot-2024-07-17-at-9.04.33-PM-1.webp\" title=\"\" width=\"1213\"\/><\/figure>\n<p><strong>Things to Know:<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.facebook.com\/help\/1052552578831700\">Facebook<\/a> and Instagram, like Google, offer Advanced Protection programs for both platforms for people whose accounts are more at risk of getting compromised. If you are a journalist, politician, or someone else in the public eye with a higher chance of getting hacked, you should enable Advances Protection which uses stricter measures at login.<\/li>\n<\/ul>\n<h2 id=\"whatsapp\">WhatsApp<\/h2>\n<p>It\u2019s easy to know your account activity for WhatsApp, another Meta-owned platform. <\/p>\n<ul>\n<li>Open WhatsApp and go to \u2018Settings\u2019.<\/li>\n<li>Then, tap on \u2018Linked devices\u2019. On Android, tap on the \u2018three-dot\u2019 menu icon and then select \u2018Linked Devices\u2019 from the menu.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><\/figure>\n<ul>\n<li>You can view all the devices where your WhatsApp account is active. <\/li>\n<li>To remove a device, tap on it and select \u2018Log Out\u2019. <\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><\/figure>\n<h2 id=\"x-formerly-twitter\">X (Formerly Twitter)<\/h2>\n<ul>\n<li>To make sure that your X account isn\u2019t being accessed by someone else, open the left menu and tap on \u2018Settings and privacy\u2019.<\/li>\n<li>Then, go to \u2018Security and account access\u2019.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><\/figure>\n<ul>\n<li>Next, go to the option for \u2018Apps and sessions\u2019.<\/li>\n<li>Here, you can see information for connected apps, sessions, account access history, and devices and apps where your account is currently logged in.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><\/figure>\n<ul>\n<li>If you go to \u2018Sessions\u2019, you can also log out of individual devices you don\u2019t recognize or all other devices in one go.<\/li>\n<li>If you see any suspicious activity or devices, change your X password.<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><\/figure>\n<h2 id=\"tips-for-keeping-your-accounts-secure\">Tips for keeping your accounts secure<\/h2>\n<ul>\n<li>Enable multi-factor authentication for your account.<\/li>\n<li>Use passkeys for accounts when they are available. Passkeys are more secure against phishing scams than passwords.<\/li>\n<li>Keep your recovery information updated to gain access to your account in case it is compromised.<\/li>\n<li>Scan your device for malware.<\/li>\n<li>Use hardware keys to protect your most sensitive accounts.<\/li>\n<li>If you\u2019re a high risk individual, like a journalist or a human rights activist, contact professional services if you suspect your account has been compromised. <\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Signs you\u2019ve been hacked You\u2019ve been logged out of your account. You find logins from devices or locations that you don\u2019t recognize in your account activity. You received emails or text messages for login attempts, password resets, or 2FA codes that you didn\u2019t request. You\u2019ve received security emails from the service about account activity you [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[130,176],"class_list":["post-2813","post","type-post","status-publish","format-standard","hentry","category-how-to","tag-microsoft","tag-web"],"acf":[],"_links":{"self":[{"href":"https:\/\/howtogeek.blog\/pt\/wp-json\/wp\/v2\/posts\/2813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/howtogeek.blog\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/howtogeek.blog\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/pt\/wp-json\/wp\/v2\/comments?post=2813"}],"version-history":[{"count":1,"href":"https:\/\/howtogeek.blog\/pt\/wp-json\/wp\/v2\/posts\/2813\/revisions"}],"predecessor-version":[{"id":2814,"href":"https:\/\/howtogeek.blog\/pt\/wp-json\/wp\/v2\/posts\/2813\/revisions\/2814"}],"wp:attachment":[{"href":"https:\/\/howtogeek.blog\/pt\/wp-json\/wp\/v2\/media?parent=2813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/howtogeek.blog\/pt\/wp-json\/wp\/v2\/categories?post=2813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/howtogeek.blog\/pt\/wp-json\/wp\/v2\/tags?post=2813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}