Trending searches: what a phisher might get you to click
You Clicked a Phishing Link Panic! I clicked on a
phishing link...or did I? I can't tell. As these attacks
get more sophisticated, sometimes it's hard to be
a hundred percent sure. Whether it's a link in a text
message or a downloaded email attachment, the important thing is that
you take action immediately. Today, I'm going to walk you through three
critical steps you need to take, and at the end I want to
explain preventative measures
that all of us should take for the future. Alright, step one, Step 1: Don't Panic & Disconnect don't panic. I mean, unless your bank is currently
being drained of all your savings, you usually have a little bit of
time to slowly consider your options. If possible. I'd say disconnect your
device from the internet. Turn off wifi, unplug the ethernet cable. We just don't want any potential malware
to have the ability to move across your network. More often than not, these kinds of attacks aim to do one of
three things. They're either swiping, login credentials, installing
malware, or in the worst case, they steal session tokens that allow
them to take over your accounts. So step two is to determine
which of these is most likely, Step 2: Evaluate & Act and then to take action
from there. For example, if the link led to a bank login page
and you input your login credentials, I'd recommend calling your bank right
now to let them know what happened. Similarly, if you input
all your credit card info, you might want to cancel that card
just to be safe. I know it sucks. It's inconvenient, but dealing with your bank and fraudulent
charges really isn't fun either. In the case where you give
over sensitive information, such as your social security number, your
ID number, that's really unfortunate. Changing this number isn't an
option, at least not an easy one. So it might be that you need to just
start vigilantly monitoring your identity in credit. I recommend you freeze your
credit and then learn how to check your credit report, both of
which are free. Thankfully, I've created video tutorials for both
of those that will walk through exactly how to do that, and I'll link to those
in the description below. Okay, for me, one of the scariest things is when I
accidentally click a link or an email attachment and nothing seems to happen. That's what I'm most
worried about malware. You'll want to find a
way to scan your device, whether it's your laptop or your
mobile device for your phone. Watch this video to see what I
recommend for desktop computers. Run some kind of malware scan using any
of the popular antivirus softwares out there. And speaking of scanning,
since you're already in action mode, Erase Your Online Information with DeleteMe it's worth taking the time to scan for
your personal information that might be floating around the internet.
This video is sponsored by DeleteMe, and this is a service that I've used
for years now to scour the internet for personal data, like my phone
number, home address, email address, and so much more. Hackers take this kind of
publicly available information
and they match it with the stuff that they've stolen
from you in a phishing attack, and then they can really wreak
havoc on your digital life. Signing up for DeleteMe is simple and
very much a set it and forget it type of service. Get a special 20% off at
joindeleteme.com/allthingssecured. Okay. Step three is to lock
down your affected accounts. Step 3: Lock Down your Accounts Most things you read online will
tell you to change your passwords, which I agree that you
should go through and do, but I would go one step further. There's a security setting you'll find
with many online accounts nowadays that allows you to remotely revoke
all device authorizations. Right now, all your devices probably
have trusted access to your accounts, which means that you don't have to input
your password every single time you open your computer or open the app
on your phone. This is convenient, but in the rare case that
your device is trusted, session token has been copied or stolen
as a part of this phishing attack, you'll just want to start clean,
right? So email's a perfect example. If I'm worried about my email
account or even my YouTube channel, I'm going to click my
manage my Google account, find the security settings on the left
side menu. I'm going to scroll down until I find the option to "Manage All
Devices," and then I can go through each device and sign them out one by one. Now, obviously this means that I'll have
to sign back in for each device, but it also resets the session
tokens for most services. I would try to do this for pretty much
any account where you stay continually logged in, including your email and your
social media at this point. Now that you've followed
these three steps, Preventative Measures or if you're watching this
through just for future reference, it's time to start taking
preventative measures. If your accounts aren't protected
by two-factor authentication, you should start doing that right now. Even if somebody steals your username
and password and a phishing attack, a second form of authentication such as
an authenticator app or a security key offers critical protection that
is extremely difficult to bypass. Second, learn how to check
links to see if they're safe. Sometimes I'll use Google's
Safe Browsing tool, or if it's a shortened bit.ly link, I'll use the CheckShortURL.com site to
understand where that link is going. And finally, STOP Method for Phishing Protection I want to train myself and my family to
spot scams and phishing attempts using the STOP method. This simple acronym reminds me
to stop whenever I see a message, to determine whether it's a suspicious
sender or even just a suspicious message, whether it's telling
me to click something, offering something amazing
or too good to be true, or pushing me to act quickly. Learn more about the stop
method here and be sure to visit joindeleteme.com/allthingssecured to
start erasing your personal data off the internet.
Introduction we all hear a lot about fishing attacks what is a phishing attack and how to protect ourselves from it by identifying a phishing email and there are many strategies which companies are using and doing to handle phishing emails like focusing on training and there are a lot of fishing games... Read more
Morning for my side my name is takovski and it's a pleasure to present to you the preliminary work that we are working on mess with respect to disability and user experience this is joint work with my supervisor gabriela lancini and we are from the center for security reliability trust at the university... Read more
[music] in today's video we are diving deep into how microsoft's crowd strike update left the airline industry in cowos and what it means for you stay tuned because by the end of this video you will know all the crucial details and how it affects your travel plans before we get started make sure to... Read more
Intro scammers are going to be furious at this video.
i'm going to show you how just by yourself, you can shut down scam and phishing websites
potentially within minutes. in this video, i'll demonstrate using a real life scam
phishing site that i found on twitter designed to steal steam accounts.... Read more
Ages ago i made this video which was about phishing emails how to recognize them and what not to do specifically do not open attachments from them and do not click links in them i said i would follow up with the description of what happens if you do that it's taken me a really long time to get back... Read more
[music] welcome back to a faster pc live support i know you've been waiting all week for this show well you don't have to wait any longer get excited this time this is exciting we're actually going to be helping people resolve their computer problems we may help you resolve your computer problems so... Read more
Why are there not more people talking about
shannon sharp's instagram scandal you need to watch this if you struggle with social media
security an unexpected and shocking event unfolded on shannon sharp's instagram account today a video
featuring explicit audio of a woman moaning was live streamed... Read more
Crowd strike holdings just reported impressive second quarter results exceeding expectations and sending their stock up 2% in after hours trading they achieved an adjusted earnings per share of $14 beating estimates of 97 with quarterly revenue soaring to $963.66 year-over-year their annual recurring... Read more
Last friday the world finally got the y2k experience it deserved when millions of windows machines went down thanks to a bad update from cyber security firm crowd strike 8.5 million to be exact but now the plot is thickened and multiple theories for why this actually happened have emerged a was it just... Read more
Nbc coverage of britney mahomes slammed after donald trump endorsement nbc's coverage of britney mahomes during the kansas city chief's nfl opener has been slammed after she endorsed donald trump nbc's coverage of britney mahomes during the kansas city chief's nfl opener has been slammed following her... Read more
Microsoft windows faces global outage know what exactly happened the root of this global it crisis is the defective update from cloud strike a major player in the cyber security field caused windows machines to encounter the blue screen of death bsod effectively brick walling them from booting up properly... Read more
Wenn sie eine gmx e mail adresse verwenden kann es passieren dass derzeit eine fake gmx e mail in ihrem posteingang landet in der sie dazu aufgefordert werden ihr konto zu bestätigen und zwar lautet der betreffen aktive benutzer werden automatisch endgültig gelöscht wobei auffällt im betreff das so... Read more