GOOGLE has revealed a list of ways to tell if your account has been hacked and tips on what to do next.
The tech giant offers support to users who suspect their accounts have been hacked through their online help center.
The most obvious sign is the red bar at the top of the screen with the message: “We detected suspicious activity on your account.”
However, the company offers plenty of other ways to find out if you’ve been hacked.
Google will provide notifications in most cases, including notifications about an unusual sign-in, a new device in your account, or changes to your username, password, or security settings.
However, users are also encouraged to be proactive if they notice changes to their account information that they do not remember authorizing.
Users should correct their settings immediately if they experience unknown changes to their recovery phone number, secondary email address, or alternate email addresses.
Other areas that may be affected are your Google Account name, security questions, or location sharing questions.
The tech giant is also urging users to take action if they notice changes to their two-step verification (2SV) methods.
Google’s 2SV provides an additional layer of security by requiring users to provide additional information during the sign-in process.
This may include accepting a text code, providing verification in an authentication app, or using biometric information such as a face scan to log in.
Two-step verification is enabled by default – if you don’t remember turning it off, it could be a sign that you’ve been hacked.
Users are also advised to change their settings if they suspect that other apps have gained unauthorized access to their accounts.
A feature called “less secure app access” is automatically turned off. Prevents apps and devices with less secure sign-in technology from accessing your Google Account.
If this setting is turned on, it may mean that a malicious player has logged into your account.
Unknown Google Pay purchases can be a huge red flag.
How to keep information safe online
Here’s what Mackenzie Tatananni, science and technology reporter at The US Sun, has to say.
It’s more important than ever to understand how your data is stored and shared.
While hackers can gain access to your accounts through brute-force attacks—simply guessing your password until they get it right—it’s also possible for your information to circulate online.
Organizations such as banks and telecommunications companies store your information in digital databases. Sometimes criminals access these databases in so-called data breaches.
They can then share this sensitive information with the public. In fact, I have seen websites dedicated to sharing leaked data on the dark web.
Some technology companies, like Apple, will alert you if a saved password has appeared somewhere in a data breach – but other times you may not realize it until it’s too late.
One useful (though not always up-to-date) tool is haveibeenpwned.com. By simply entering your email address, you can find out if your information has been disclosed, as well as the company or website from which it was taken.
Strong passwords are an essential part of keeping your data secure. Do not repeat passwords between sites. Make sure they are at least 12 characters long (but the longer the better). If allowed, use a combination of letters, numbers and symbols. Dictionary words, names and other personal information such as birthdays are among the easiest for hackers to guess.
As always, use common sense. You may receive fraudulent emails and text messages asking you to share personal information. Be aware of the signs of fraud – agencies such as the FTC and OFCOM have a wide range of tools to educate and inform you.
The tech giant is urging users to remove bank accounts and cards, including gift cards, that were suddenly linked to their Google Pay account without permission.
Users can report fraudulent charges to Google for a refund. It is also wise to contact your bank or credit card company.
If you believe someone else has logged into your account, Google recommends that you change your password immediately.
This information should be updated on sites where you use the same password as it may have been misused. Remember to change the information wherever it may have been stored, including your browser.
Users are also encouraged to identify and remove any unknown devices logged into their accounts.
The process is fairly simple: Start by selecting “Security” in the left navigation bar in your Google Account.
In the “Your device” panel, select “Manage device”. All devices that are currently signed in will be displayed.
To remove a device, click the three dots in the upper right corner of the device tab.
Google also offers a Security Checkup tool that provides an overview of your account.
This feature will show your security settings and connected devices so you can Assessment and make the required changes.