SlideShare uma empresa Scribd logo
1 de 8
Telltale Signs Your Gmail is Hacked
Two Basic Signs Your Account is
Hacked
1. You can’t log in, even with a password you know is
valid
1. Your account is sending e-mails that you never
wrote
Obvious vs. Not-so-Obvious
• Those two signs are
obvious, but a savvy
hacker don’t use clues,
they leave clues
• They’d rather hijack
your account and use it
without you ever
knowing it
Savvy Internet Hackers
• Serious hackers:
– Rarely change your password
– Don’t often send e-mail to others from your address book
• Modern hackers will hang out in your account until
you get a bank statement or other sensitive data
– Will use that data to steal money or information from you
Gmail Protects You
• Gmail is familiar with these hackers
• They have added a third method for sniffing out e-
mail hackers: the account activity log
– Located at bottom of Gmail inbox below “You’re currently
using XXXX MB (XX%) of your XXXX MB”
– Bottom line displays “your last account activity”
• This reader displays the last time someone logged into your Gmail
account
• If the time and data don’t match to when you last logged in, that
should be a red flag for you
Take Advantage of Gmail Security
• It’s a good idea to regularly click the ‘details’ link that
follows the last account activity timestamp
– This prompts a chart of your last dozen Gmail logins
• Organized by login method i.e. web browser, mobile phone,
POP3/IMAP
– Each login is time stamped and associated with an IP
address
Finding the Hacker
• If you find a suspicious login date/time and IP
address:
– Copy the IP number and past it into the lookup service at
Domain Tools
– You’ll then learn who owns the IP address that logged into
your account
– If you find a sketchy IP address on the activity list, then it’s
a good time to change your Gmail
Always Plan for Security
• Regardless of what a hacker does on your site, you
can begin protecting yourself today with both a
social media backup plan and a Google Apps backup
plan
• Backups prevent against any type of data loss
• Whether from Backupify or not, take control of your
online life with an online backup

Mais conteúdo relacionado

Destaque

Expeditie mont blanc
Expeditie mont blancExpeditie mont blanc
Expeditie mont blanc
Elisabeth
 
Những giá trị sống cho tuổi trẻ
Những giá trị sống cho tuổi trẻNhững giá trị sống cho tuổi trẻ
Những giá trị sống cho tuổi trẻ
bita89
 
Givven - The Viral Promotion Application
Givven - The Viral Promotion ApplicationGivven - The Viral Promotion Application
Givven - The Viral Promotion Application
damanit
 
Evidence of implementation
Evidence of implementationEvidence of implementation
Evidence of implementation
Tess Baguio
 

Destaque (19)

Expeditie mont blanc
Expeditie mont blancExpeditie mont blanc
Expeditie mont blanc
 
Autorretratos
AutorretratosAutorretratos
Autorretratos
 
Horse trail2
Horse trail2Horse trail2
Horse trail2
 
Licencias creative commons
Licencias creative commonsLicencias creative commons
Licencias creative commons
 
Những giá trị sống cho tuổi trẻ
Những giá trị sống cho tuổi trẻNhững giá trị sống cho tuổi trẻ
Những giá trị sống cho tuổi trẻ
 
간지Ppt
간지Ppt간지Ppt
간지Ppt
 
Volo credentials november 2015 sc
Volo credentials   november 2015 scVolo credentials   november 2015 sc
Volo credentials november 2015 sc
 
Interview with Elaine
Interview with ElaineInterview with Elaine
Interview with Elaine
 
La ricerca si fa impresa
La ricerca si fa impresaLa ricerca si fa impresa
La ricerca si fa impresa
 
Swug apr 2010 - delivery with windows server 2008 by dennis
Swug apr 2010 - delivery with windows server 2008 by dennisSwug apr 2010 - delivery with windows server 2008 by dennis
Swug apr 2010 - delivery with windows server 2008 by dennis
 
Profile your ideal workplace
Profile your ideal workplaceProfile your ideal workplace
Profile your ideal workplace
 
Andy
AndyAndy
Andy
 
StartupBus UK presentation
StartupBus UK presentationStartupBus UK presentation
StartupBus UK presentation
 
Givven - The Viral Promotion Application
Givven - The Viral Promotion ApplicationGivven - The Viral Promotion Application
Givven - The Viral Promotion Application
 
Evidence of implementation
Evidence of implementationEvidence of implementation
Evidence of implementation
 
Dasar html
Dasar htmlDasar html
Dasar html
 
Seminario ict agricoltura
Seminario ict agricolturaSeminario ict agricoltura
Seminario ict agricoltura
 
Multiprojects management
Multiprojects managementMultiprojects management
Multiprojects management
 
Presentazione prix italia2011
Presentazione prix italia2011Presentazione prix italia2011
Presentazione prix italia2011
 

Mais de Datto

CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
Datto
 

Mais de Datto (20)

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School
 
What's In a Cloud? Purpose-Built vs. Public
What's In a Cloud?  Purpose-Built vs. PublicWhat's In a Cloud?  Purpose-Built vs. Public
What's In a Cloud? Purpose-Built vs. Public
 
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessFollow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security Success
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS Backup
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 Presentation
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild West
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

How To Tell If Your Gmail Account Is Hacked

  • 1. Telltale Signs Your Gmail is Hacked
  • 2. Two Basic Signs Your Account is Hacked 1. You can’t log in, even with a password you know is valid 1. Your account is sending e-mails that you never wrote
  • 3. Obvious vs. Not-so-Obvious • Those two signs are obvious, but a savvy hacker don’t use clues, they leave clues • They’d rather hijack your account and use it without you ever knowing it
  • 4. Savvy Internet Hackers • Serious hackers: – Rarely change your password – Don’t often send e-mail to others from your address book • Modern hackers will hang out in your account until you get a bank statement or other sensitive data – Will use that data to steal money or information from you
  • 5. Gmail Protects You • Gmail is familiar with these hackers • They have added a third method for sniffing out e- mail hackers: the account activity log – Located at bottom of Gmail inbox below “You’re currently using XXXX MB (XX%) of your XXXX MB” – Bottom line displays “your last account activity” • This reader displays the last time someone logged into your Gmail account • If the time and data don’t match to when you last logged in, that should be a red flag for you
  • 6. Take Advantage of Gmail Security • It’s a good idea to regularly click the ‘details’ link that follows the last account activity timestamp – This prompts a chart of your last dozen Gmail logins • Organized by login method i.e. web browser, mobile phone, POP3/IMAP – Each login is time stamped and associated with an IP address
  • 7. Finding the Hacker • If you find a suspicious login date/time and IP address: – Copy the IP number and past it into the lookup service at Domain Tools – You’ll then learn who owns the IP address that logged into your account – If you find a sketchy IP address on the activity list, then it’s a good time to change your Gmail
  • 8. Always Plan for Security • Regardless of what a hacker does on your site, you can begin protecting yourself today with both a social media backup plan and a Google Apps backup plan • Backups prevent against any type of data loss • Whether from Backupify or not, take control of your online life with an online backup