Wednesday, January 16, 2019

Secure a hacked or compromised account - Google Account Help

Secure a hacked or compromised account - Google Account Help

This describes what I was experiencing. 




Secure a hacked or compromised account

If you notice unfamiliar activity on your Google Account, someone else might be using it without your permission. Use the info below to help spot suspicious activity, get back into your account, and make it more secure.

Step 1: Sign in to your account

Sign in to the Google Account you want to secure.

If you can't sign in

Go to the account recovery page, and answer the questions as best you can. These tips can help.

Use the account recovery page if:

  • Someone changed your account info, like your password or recovery phone number.
  • Someone deleted your account.
  • You can't sign in for another reason.

Tip: To make sure you're trying to sign in to the right account, try recovering your username.

Step 2: Review activity & help secure your account

  1. Go to your Google Account.
  2. On the left navigation panel, click Security.
  3. On the Your devices panel, click Manage devices.
  4. Check for any devices you don't recognize.
    • If you find a device that you don't recognize, tap Don't recognize a device? Then, follow the steps on the screen to help secure your account.
    • If you recognize all the devices, but still believe someone else is using your account, find out if your account has been hacked.

Step 3: Take more security steps

If you think your account has suspicious activity, you might need to remove harmful software. To improve your account's security, install and run trusted anti-virus software.

You can also reset your computer to its factory settings and reinstall the operating system.

Important: Make sure to back up the files you need. Learn how to upload files to Google Drive.

Find out if your account has been hacked

If you notice any of these signs, someone else may be using your Google Account.

Important: If you think someone else is using your Google Account, change your password immediately for:

  • Your Google Account (if you didn't already change it after you noticed suspicious activity)
  • Apps and sites where you use the same password you used for your Google Account
  • Apps and sites that contact you through your Google Account email address
  • Apps and sites where you sign in with your Google Account email address
  • Apps and sites for which you've saved passwords in your Google Account

Suspicious account activity

Correct the setting immediately if you see unfamiliar changes to these settings:

Your financial activity might be suspicious if:

Note: We'll use your recovery phone number and email address to tell you about suspicious activity.

We'll inform you of unusual activity through:

  • A notification about an unusual sign-in or a new device using your account.
  • A notification that there was a change to your username, password, or other security settings, and you didn't make the change.
  • A notification about some other activity you don't recognize.
  • A red bar at the top of your screen that says, "We've detected suspicious activity in your account."
  • Your "Device activity and security events" page.

Suspicious activity in Google products you use

Gmail settings

Correct the setting immediately if you see unfamiliar changes to:

Gmail activity

Your Gmail activity might be suspicious if:

  • You stopped getting emails.
  • Your friends say they got spam or unusual emails from you.
  • Your username has been changed.
  • Your emails were deleted from your inbox and aren't found in Trash. You can report emails have gone missing and possibly recover them.

Your YouTube activity might be suspicious if:

Your Google Drive activity might be suspicious if:

Your Google Photos activity might be suspicious if:

Your Blogger activity might be suspicious if:

  • Posts you didn't publish appear on your blog.
  • You get comments on posts you didn't publish.
  • Your mail-to-Blogger address has changed, but you didn't change it.
  • Your blog has disappeared or been blocked.


Elyssa D. Durant
Policy & Research Analyst

No comments:

Post a Comment