With our digital footprint expanding at such a fast pace, it's also becoming easier for hackers to target users. Sometimes, a hack might even go unnoticed until it's too late as people don't even use all their accounts regularly, especially if it's a subtle hack (no or small charges to your bank account, no public posts, etc.). Fortunately, most online services have tools that can help users identify if their account is being accessed by anyone else and take back control of their accounts.

Signs you've been hacked

  • You've been logged out of your account. Worse, you cannot log back in.
  • Your account has been locked due to suspicious activity.
  • You find logins from devices or locations that you don't recognize in your account activity.
  • You've received security emails from the service about account activity you don't recognize. (Do check they are not phishing emails and are from a legitimate source.)
  • Your sent folder has emails that you didn't send.
  • There are purchases in your account that you don't recognize or you see unauthorized charges in your linked payment method.
  • Your contacts are receiving strange emails or messages from your social media accounts. Alternatively, there are posts on your social media you didn't make.
  • There are unusual changes in your account settings like updated recovery information.
  • New apps or extensions are connected to your account that you didn't authorize.

If you think you've been hacked, you can use the tools most services have in place to check for unusual activity and take further action, like changing your passwords, logging out of other devices, or contacting app support, if required. Also, if you were reusing the compromised password on other websites (which you never should), change those passwords as well.

Google

Securing your Google account is important because it's linked to many websites and apps out there and can be used to hack into them as well.

  1. If you think someone can access your Google account, go to your Gmail account and scroll down to the bottom.
  2. Click on 'Details' below 'Last account activity'.
  1. You'll be able to see all the places where your account is active. Click on 'Show details' to view more information about it. If you don't recognize a location, click on the 'Security Checkup' link to investigate it further.
  1. Here, you can see the devices that have access to your account and remove any device you don't recognize or use anymore.
  1. Next, go to the page for managing your Google account.
  2. Click on 'Security' from the left side.
  3. Then, go to 'Recent Security Activity' and check that there's no suspicious activity.
  1. If you see one you don't recognize, click on it.
  1. Then, click on 'No, secure account' on the next screen.
  1. Follow the steps on the screen. Depending on the activity, this might be something as simple as revoking a service's access to your account or as drastic as changing your account password.
  2. When you change your password, you'll be signed out of every location, except on the device you use to verify it's you.
  3. You can also check the devices you can get the Google prompt on and your recovery phone numbers and emails from the Security settings to make sure that no one has altered that information.
  1. If you can't access your account in case someone has changed the password and recovery information, you'll need to go to the account recovery page and answer the questions to recover your account.

Things to remember:

  • If you have financial information saved in your Google account that has been compromised, for example, credit cards in Google Chrome or Google Pay, you should contact your bank and take the appropriate steps.
  • If you also have other information or personal documents, like your passport, saved anywhere in your Google account such as Drive, Photos, etc., you should contact your local authorities and file a complaint.
  • For users at higher risk of getting their accounts compromised, like journalists, politicians, human rights activists, etc., Google also offers an Advanced Protection Program that makes it difficult to get into someone's accounts. While previously, it required the use of a hardware key, Google has now expanded the program to work with Passkeys as well so you don't need to buy a hardware key if you don't want to.

Apple ID

You can check whether your Apple ID is safe relatively easily using your iPhone, iPad, or Mac. You can also access this information by going to appleid.apple.com from a web browser.

  1. On your iPhone, iPad, or Mac, open the Settings app.
  2. Then, tap your name at the top on your iPhone/ iPad. On the Mac, click your name at the top of the left menu.
  1. Scroll down and you'll be able to see a list of all the devices where your Apple ID is logged in.
  1. You can tap on a device to see more information about it. If you don't recognize a device, tap on 'Remove from Account'.
  1. You should also change your Apple ID password if an unrecognized device has access.
  2. If you can't access your account and are unable to reset the password as well, you can start the recovery process for your Apple ID by going to iforgot.apple.com.

Things to remember:

  • Set up two-factor authentication after securing your account if you haven't already.
  • If you're using an email address from another provider with your Apple ID, say Google or Yahoo, make sure that that account is secure as well and only you have access to it.

Yahoo

Yahoo has similar tools to help you figure out where your account is active.

  1. Go to yahoo.com and sign in to your account.
  2. Hover over your profile picture and select 'Overview' from the menu to go to the account management screen.
  1. Then, click on 'View connected devices' to see where your account is active.
  1. Click on any activity you find suspicious to review it further. If you don't recognize it, change your password. This will sign you out from all other devices except the one you're using.
  1. From the account management page, you can also click on 'Review Recent Activity'.
  2. This will show any activity related to your account, like changes in passwords, recovery phone numbers or emails, etc. If you find any suspicious activity here, change your password.
  3. Then, go to 'Security'. Here, review and remove any unsanctioned recovery emails, phone numbers, or devices.

Microsoft

For your Microsoft or Outlook account, you can see your account activity by going to your account page.

  1. Go to microsoft.com and sign in to your account.
  2. Then, click on the Profile icon and go to 'My Microsoft account' from the menu.
  1. Go to 'Security' from the left menu.
  2. Next, click on 'View my sign-in activity' under the 'Manage how I sign in' option.
  1. Here, you can see all sign-in attempts (successful and unsuccessful) to your account.
  2. With every sign-in attempt, you can expand it to view more information like the device and browser used and the IP address.
  1. If you see any suspicious activity, click on 'Secure your account' to change your password.

Facebook and Instagram

Your social media accounts can also be hacked and result in disastrous consequences. Meta offers tools for its platforms so users can review their account activity.

  1. Open Facebook and go to Settings and Privacy > Settings > Password and Security.
  2. Then, click on 'Password and Security' once again.
  3. Next, click on 'Where you're logged in' under Security checks to see your account activity.
  1. If your Facebook account is connected to Instagram, you'll be able to see the account activity for both platforms from here. Choose the platform you want to review the activity for.

    If your accounts are not connected or you don't have a Facebook account, you can access the same page from the 'Accounts Centre' of Instagram settings as well.
  1. Then, click on the device to further review it. You can see the device name, location, and time of the login. Click on 'Log out' to log your account out from a device you don't recognize or no longer use. You can also set up alerts for when a device logs into your account.

Things to Know:

  • Facebook and Instagram, like Google, offer Advanced Protection programs for both platforms for people whose accounts are more at risk of getting compromised. If you are a journalist, politician, or someone else in the public eye with a higher chance of getting hacked, you should enable Advances Protection which uses stricter measures at login.

WhatsApp

It's easy to know your account activity for WhatsApp, another Meta-owned platform.

  1. Open WhatsApp and go to 'Settings'.
  2. Then, tap on 'Linked devices'.

    On Android, tap on the 'three-dot' menu icon and then select 'Linked Devices' from the menu.
  1. You can view all the devices where your WhatsApp account is active.
  2. To remove a device, tap on it and select 'Log Out'.

X (Formerly Twitter)

  1. To make sure that your X account isn't being accessed by someone else, open the left menu and tap on 'Settings and privacy'.
  2. Then, go to 'Security and account access'.
  1. Next, go to the option for 'Apps and sessions'.
  2. Here, you can see information for connected apps, sessions, account access history, and devices and apps where your account is currently logged in.
  1. If you go to 'Sessions', you can also log out of individual devices you don't recognize or all other devices in one go.
  2. If you see any suspicious activity or devices, change your X password.

Tips for keeping your accounts secure

  1. Enable multi-factor authentication for your account and don't reuse passwords.
  2. Use passkeys for accounts when they are available. Passkeys are more secure against phishing scams than passwords.
  3. Keep your recovery information updated to gain access to your account in case it is compromised.
  4. Scan your device for malware.
  5. Check websites like haveibeenpwned.com regularly to make sure your credentials aren't at risk.
  6. Use hardware keys to protect your most sensitive accounts.
  7. If you're a high-risk individual, like a journalist or a human rights activist, contact professional services if you suspect your account has been compromised.