{"id":18169,"date":"2018-05-23T08:00:08","date_gmt":"2018-05-23T12:00:08","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=18169"},"modified":"2022-04-27T15:13:17","modified_gmt":"2022-04-27T19:13:17","slug":"what-to-do-if-youre-the-victim-of-hacking","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/what-to-do-if-youre-the-victim-of-hacking\/","title":{"rendered":"What to Do if You&#8217;re the Victim of Hacking"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">More and more victims are falling prey to hacking nowadays due to the sophisticated level of online scams &#8212; plaguing both computer and smartphone users. Hackers have developed ways of sending emails that look legit leading you to believe they are coming from your employer, a friend, or your bank. A good way to protect your smartphone is with <\/span><a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=MKT_BLOG_US&amp;c=what_to_do_if_youre_victim_of_hacking\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">dfndr security<\/span><\/a><span style=\"font-weight: 400;\">, a highly rated antivirus app that offers a slew of cybersecurity features such as a full virus scan and advanced anti-hacking.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/hackers-are-taking-over-your-sim-card-and-personal-phone-number\/\"><b>Hackers Are Taking Over Your SIM Card and Personal Phone Number<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Being the victim of an online attack is shocking, not to mention embarrassing, but with knowledge and resources to turn to, you can gain some closure and move forward.<\/span><\/p>\n<p><b>Types of Scams<br \/>\n<\/b><span style=\"font-weight: 400;\">There are <\/span><a href=\"http:\/\/www.fresnobee.com\/news\/business\/article207278374.html\"><span style=\"font-weight: 400;\">3 main ways<\/span><\/a><span style=\"font-weight: 400;\"> that hackers try to trick you. One is to offer a reward such as a free vacation or gift card. The second comes in the form of a threat, demanding payment due to unpaid taxes or missed jury duty. The last method is a generic email that could appear to be from your employer, but it\u2019s really not.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All of these fake emails are designed to extort payment or have you unknowingly click on a link filled with malicious code, which can then be used to steal your personal or financial information.<\/span><\/p>\n<p><b>How to Avoid Getting Hacked<br \/>\n<\/b><span style=\"font-weight: 400;\">If an email seems suspicious, call the company the email appears to be from to ensure it\u2019s not a scam, or type the real URL directly in your browser. If you weren\u2019t expecting an email from a particular sender yet receive one full of links, don\u2019t click on any of them &#8212; they could be malware designed to take over your phone. Same goes for generic emails, they are usually a bigger sign of potential danger.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Never share personal information like your full name, banking details, credit card number, or anything else to the sender of an unsolicited email.<\/span><\/p>\n<p><b>What to Do if You\u2019re Targeted<br \/>\n<\/b><span style=\"font-weight: 400;\">To address the feeling of helplessness that comes with being victimized, consider reaching out to any of these resources:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/www.bbb.org\/scamtracker\/us\"><span style=\"font-weight: 400;\">BBB\u2019s Scam Tracker<\/span><\/a><span style=\"font-weight: 400;\"> allows you to enter details of a scam you were the victim of. Your entry is added to a large database of known scams. This can help others in similar situations. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Report a scam on the <\/span><a href=\"https:\/\/www.justice.gov\/criminal-ccips\/reporting-computer-internet-related-or-intellectual-property-crime\"><span style=\"font-weight: 400;\">Department of Justice\u2019s website<\/span><\/a><span style=\"font-weight: 400;\"> in the case of an intellectual property crime (they do happen).<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If your social profile is hacked, use the <\/span><a href=\"https:\/\/www.facebook.com\/help\/community\/question\/?id=10200382247092528\"><span style=\"font-weight: 400;\">Facebook Help Community<\/span><\/a><span style=\"font-weight: 400;\"> to report the incident. The compromised account will be shut down as they investigate the matter. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/www.ic3.gov\/complaint\/splash.aspx\"><span style=\"font-weight: 400;\">FBI\u2019s IC3<\/span><\/a><span style=\"font-weight: 400;\"> is another avenue to file a complaint of a serious hack or other online crime.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Along with federal sources, always utilize the local authorities at the same time to help gain your device or information back.<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Being subjected to a hacking attack can feel humiliating, but there are avenues to report these crimes.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[194],"tags":[259,218,358,545,249,223],"class_list":["post-18169","post","type-post","status-publish","format-standard","hentry","category-tips-tutoriais","tag-hackers","tag-privacy","tag-protection","tag-safety","tag-security","tag-tips"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=18169"}],"version-history":[{"count":8,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18169\/revisions"}],"predecessor-version":[{"id":18929,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/18169\/revisions\/18929"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=18169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=18169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=18169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}