Freeware Files | Download Free Software

Wednesday, 18 June 2014 00:00

You've fallen for a scam! Now what?

Rate this item
(0 votes)

Cybercriminals tricked a friend into giving away sensitive information. Now he wants to know how “to mitigate this situation?”

Don’t feel bad. We all make stupid mistakes. But with these sorts of mistakes, you have to act fast to avoid disaster.

What you need to do depends on how you were tricked. Did you give them your email password? Your bank and/or credit card numbers? Your passwords for Facebook, Twitter, or other social media sites? Did they remotely access your PC, or trick you into installing software?

If you have reason to believe that criminals can access your financial accounts, call your banks and credit card companies immediately. Explain the situation and follow their instructions.

Next, change any passwords that might have fallen into criminal hands. This includes email, social network, and other passwords.

If you’ve been using the same password for multiple accounts, change all of those passwords as well. And stop using the same password for multiple accounts already.

If you can’t change a password—or even log on to a site—the crook got there first. Check the site for instructions on recovering a hijacked account. Search for hijacked account and the name of the service (Facebook, Google, or whatever) and follow the directions given on the service's website.

By the way, if you set up your account with two-step verification (most major services offer this), chances are slim that criminals will be able to access and hijack your account.

Next, call the police and ask to make a report. No, the cops will not find the crooks and return what was stolen. But banks, credit card companies, and other institutions may want to see a police report. It makes your claim to victimhood official.

Don’t call 9-1-1. Unless the criminal is physically inside your home, it's not an emergency.

Were you tricked into allowing someone to remotely control your PC? Or into downloading software? If so, there's no telling what information they got, or are still getting.

In that case, change your Windows logon password immediately. And scan your PC for malware using multiple anti-malware tools.

Source

Subscribe via RSS or Email:

 
Read 1095 times Last modified on Wednesday, 18 June 2014 06:01
  1. Latest News
  2. Most Popular
  3. Top Rated
  4. Latest Comments
  • Michael A
    Why they do not shut down the company that provides the faulty patchwork systems that make such malware first possible? No, not because of a faulty ...

    Read more...

     
  • Moubreb
    The people at any router between You and facebook can read Your communication if: 1. You're using an http: connection 2. A fake facebook certificate ...

    Read more...

     
  • theoctagon
    You could always just use what's already baked in: Android Device Manager. https://www.google.com/android/devicemanager

    Read more...

     
  • Michael A
    AFAIR the patch was available one day after the discovery of heartbleed. That normal with Free Software. Only mislead users of commercial scrap have ...

    Read more...

next
prev

Quick Search

Powered by Liquidtroll
Prev Next

How to Protect my Children On the Digital World

07-02-2013 Hits:2673 Security Panagiotis K. - avatar Panagiotis K.

How to Protect my Children On the Digital World

Before you let your child walk alone in a big city, he must have a certain age and he have to learn some things. So every parent needs to possess relevant...

How to recover deleted files

14-05-2014 Hits:1241 How To Vasia L. - avatar Vasia L.

How to recover deleted files

A user lost “a load of photos.” Here’s my advice for recovering them. Lost files can usually be recovered—if you discover the loss soon enough. But every time you write to...

Tor anonymity network to shrink as a result of Heartbleed flaw

24-04-2014 Hits:723 Security Vasia L. - avatar Vasia L.

Tor anonymity network to shrink as a result of Heartbleed flaw

The Tor Project has flagged 380 Tor relays vulnerable to the critical Heartbleed flaw to be rejected from the Tor anonymity network, reducing the network’s entry and exit capacity. The decision...

Microsoft Has to Rename the Service of SkyDrive

27-09-2013 Hits:1195 Microsoft Panagiotis K. - avatar Panagiotis K.

Microsoft Has to Rename the Service of SkyDrive

The British Supreme Court is forcing Microsoft to rename the service of SkyDrive! This is happening because it considered that violated the commercial rights of the company British Sky Broadcasting Group.

ZevenOS-Neptune 1.9.1 - Eyes on Linux

16-12-2010 Hits:5184 Linux Panagiotis K. - avatar Panagiotis K.

ZevenOS-Neptune 1.9.1 - Eyes on Linux

ZevenOS is a German-born project that offers Debian-based and Ubuntu-based versions of their BeOS-like scheme. ZevenOS is supported on Ubuntu (Xubuntu) and ZevenOS-Neptune is supported on Debian Testing. The important mean...