If you are not sure, get help
If too difficult or confusing, then make sure to get the help. Find someone who can help you get rid of this situation by working through the steps above.
While you’re at it, find someone that can help you establish a more secure system for your email, and advise you on the steps you need to take to prevent this from happening again .
And then follow these steps.
The fact that you and I are ultimately responsible for our security. That means taking the time to learn, and set everything up safely.
Yes, additional security can be seen as an inconvenience. In my opinion, dealing with a hacked email account is significantly more inconvenient, and sometimes downright dangerous. It is worth the trouble to make things right.
If that’s still too much … well … expect your account to get hacked again
1. Recover your account
Log into your account via email provider’s website.
If you can log in successfully, consider yourself extremely lucky, and proceed to step 2 immediately.
If you can not log in, even though you know you are using the correct password, then the hacker was able to change your password. Your password is no longer know the correct password.
Then you have to use the “forgot my password” recovery option or other accounts provided by the service.
This often means that the service will send password reset instructions to an alternate email address that you can access, or send a text message to a mobile phone number that you have set before dirty.
If the recovery methods do not work – because hackers have changed everything, or because you are no longer able to access email or phone replacement of old – then you may be out of luck.
If recovery option does not work for whatever reason, you just have to use the customer service phone or email address provided by that email service. For a free email account, usually there is no customer service. Your choices are usually limited form of self-recovery, Knowledge Base articles, and the official discussion forums, where the service representative may (or may not) participate. For paid accounts, there are usually more customer service options that are most likely to be able to help.
Important: If you are unable to restore access to your account, it is the other person’s account. I can not stress this enough. It is currently the hacker’s account. Unless you’ve backed up, everything in it is gone forever, and you can skip the next two categories. You will need to set up a new account from the beginning and start again.
Having my computer or not?
When faced with this situation, many people worry that the malicious software on their computers responsibly.
That’s rarely the case.
In most cases, your computer is never involved.
The problem is not on your computer. The problem is simply someone else knows your password and login to your account. They may be on the other side of the planet, away from you and your computer (and often, they are).
Yes, it can be a key-logger is used to obtain passwords. Yes, it could be your computer has been used improperly in an open WiFi access point. So, yes, absolutely, malware scan and use it safely, but do not think for a moment that once you are free of malware, you’ve solved the problem. You do not have.
You need to follow the steps outlined here to regain access to your account and to protect it from further compromise.
You will use your computer, but your computer is not the problem.
2. Change your password
Once you regain access to your account (or if you never lose it), immediately change your password.
As always, be sure that it is a good password: easy to remember, hard to guess, and lasting. In fact, even better, but make sure your password is at least 10 characters or more – ideally 12 or more, if the service supports it.
But do not stop here.
Changing your password is not enough.
3. Change your recovery information
While a hacker can access your account, they can leave alone your password so you will not notice the hack for a while longer.
But whether they change your password or not, they can change all the information recovered.
The reason is simple: when you finally do change your password, hackers can follow the “I forgot my password” step and reset passwords out from underneath you, using recovery information they put out.
So you need to check all of it and to change much about it … immediately.
Changing the answer to your secret question. They do not need to match the questions (you can tell your mother’s maiden name is “Microsoft”); all that matters is that the answers you give during recovery account the future in line with the answers you put here today.
Check your alternate email address (es) associated with your account and remove any that you do not recognize or no longer accessible to you. Hackers can add your own. Make sure that all of your alternate email address that belongs to your account, and you can access them.
Check the phone number related to your account. The hacker may have their own set. Remove any you do not recognize, and make sure that if a phone number is provided, it is yours and no one else, and that you have access to it.
These are the main items, but some e-mail service for more information that they use to recover your account. Take the time now to research that information may be. If it’s something that a hacker may have changed, change it to something else appropriate for you.
Overlooking the information is used to restore the account allows hackers to easily hack again; make sure you take the time to carefully check and reset all accordingly.
4. Check the related accounts
This is probably the aspect of consumption account recovery time and most scariest.
Fortunately, it is not common, but the risk is high, so this understanding is very important.
While the hacker can access your account, they have access to your email, including what is in your account now and what comes in the future.
Let’s say a hacker found you a notification email from your Facebook account. The hacker now knows you have a Facebook account, and the email address you use for it. Hackers can on Facebook, enter your email address, and request a password reset.
A reset password sent to your email account … that hackers can access.
As a result, hackers can now hack your Facebook account has been hacked through your email account.
In fact, the hacker now has full access to any account-related email accounts hacked.
Give a Thief Your Password? Like your bank. Or Paypal.
Let me say that again: because hackers can access your email account, he can request a password reset sent to it from any other account that you use local this e-mail address. In doing so, the hacker can break in and access to the account.
What you need to do: check your other accounts to reset your password has not started, and any other suspicious activity.
If there is any doubt, consider the initiative to change the password on that account. (There is a strong argument to check or change the recovery information for this account, just as you check your email account, for all the same reasons.)
Check the “out of office”, reply to, forward, and signature
If your email service provide an out-of-office or vacation features auto-answer, or some kind of automatic signature appears at the bottom of every email you send, such as those with may already know you’re hacking.
Hackers will often set an automatic reply in a hacked account to automatically respond to their spam. Every time someone sends you an email, they get this fake message – usually written so it looks like you actually send it.
If your account includes the ability to set a different email address to answer, certainly not been established. Check also to ensure that your emails are not automatically forwarded to an email address.
Similarly, hackers set up a signature to every email you send includes anything they advertise – often a link to a malicious website.
Be sure to test any features or signature autoresponder when you regain access to your account.
5. Let your contacts know
Some disagree with me, but I encourage you to let your contacts know that your account has been hacked, or from your account once you’ve restored it, or from the new e-mail account you.
Notify all contacts in the address book of your online accounts; address book that hackers can access.
I believe it is important to inform your contacts so they know not to pay attention to emails sent while the account was hacked. Occasionally, hackers try to impersonate you to extort money from your phonebook. The sooner you let them know the account was hacked, earlier than they would know that such a requirement – or even traditional spam can originate from your account – is not true.
6. Start the backup
A common response to my suggestion that you give your contact info is: “But my contacts had disappeared! The hacker deleted all, and all of my email is good!”
Yes. That happens.
It is usually part of a hacker does not want to leave a trace – they removed everything they’ve done, with everything you have. Or.
If you’re like most people, you have not backed up your webmail. All I can suggest at this point is to see if your email service will restore it for you. Generally, they will not. Because not doing their removal, which is the work of someone logging into your account, they can simply assert that it is your responsibility.
Hard as it is to hear, they are absolutely right.
Start backing up your email now. Start backing up your contacts now.
For email, which can be anything from setting up a computer to download email periodically, to set up an automatic forwarding of all incoming email to another account, if suppliers support that. For contacts, it can be set up to contact a remote utility (relatively rare, I’m afraid) to duplicate your contacts on your computer, or exported periodically address your contacts and upload them, it’s what I do.
7. Learn from experience
PasswordAside from “you need to get back up,” one of the most important lessons to learn from this experience is to consider all the ways your account may have been hacked, and then perform the appropriate steps to protect themselves from a repeat appearance in the future.
Use strong passwords that can not be guessed, and not shared with anyone.
Do not fall for a phishing email attempts. If they ask for your password, they are not real. Do not share your password with anyone.
Do not click on links in emails that you are not 100% certain. Many phishing attempts lead to fake websites asking you to log in and then steal your passwords when you try.
If you’re using WiFi hotspots, learn how to use them safely.
Keep your operating system and other software on your computer to keep up to date, and run the tool against malicious software up-to-date.
Learn to use the internet safely.
Consider multi-factor authentication (which just is not enough to know the password to gain access). More and more services are starting to support this, and for those who do (Gmail, for example), it’s worth considering.
If you are lucky enough to be able to determine exactly how your password has been compromised (it is not common), then completely take measures so that it never happens again.
See more: WILL SOMEONE HACKING MY ROUTER SHOW UP ON MY COMPUTER?