Skip to main content

These are the precautions you have to take, When your E-MAIL has been Hacked.

It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out by suggesting some of the steps that you need to take as soon as you realize that your email account is hacked.
Here is a list of steps and procedures that you need to follow in order to initiate the password recovery process:

Steps to Recover Gmail Password:

It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try:
Step-1: Try resetting your password! This is the first step and probably the easiest way to get your account back in action. In this process, Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
Update:
Gmail has now introduced a new feature wherein it is possible to reset your password using your mobile number. Once the reset process is initiated, Gmail will send new login details to your mobile number itself.
If you cannot find success from the Step-1, then proceed to Step-2.
Step-2: Many times the hacker will change the secret question and the secondary email address right after the account is compromised. This is the reason for the password reset process to fail. If this is the case, then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like:
  1. Email addresses of up to five frequently emailed contacts
  2. Names of any 4 Labels that you may have created in your account
  3. List of other services associated with your compromised account
  4. Your last successful login date
  5. Account created date
  6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However, you need to figure out the closest possible date/answers and fill out this form. This is your last chance!
The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link

Steps to Recover Yahoo and Hotmail Password:

Unfortunately, for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option.
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.

Comments

Popular posts from this blog

The 20 Most Popular Hacking Tools for "Kali Linux"

Top 20 Most Popular Hacking Tools for "Kali Linux". I n the world of cyber security, there are many tools available on the internet, many of them are free and others are paid. 1.  Aircrack-ng Aircrack-ng.org is an 802.11 WEP and WPA-PSK keys breaking program that can resolve keys once enough information regarding the term stolen. It executes the standard FMS attack alongside a few improvements like KoreK breachand additionally the all-new PTW attack, in this way making the assault much quicker contrasted with other WEP splitting devices. Actually, Aircrack-ng is an arrangement of software for evaluating remote systems. 2.  sqlmap sqlmap is an open source infiltration testing device that robotized the procedure of recognizing and abusing SQL infusion imperfections and assuming control of database servers. Full support for  MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, SAP MaxDB and HSQLDB  data...

Wifite : Hacking Wifi the easy way : Kali Linux.

Wifite While the aircrack-ng suite is a well known name in the wireless hacking , the same can't be said about Wifite. Living in the shade of the greatness of established aircrack-ng suite, Wifite has finally made a mark in a field where aircrack-ng failed. It made wifi hacking everyone's piece of cake. While all its features are not independent (eg. it  hacks WPS using reaver ), it does what it promises, and puts hacking on autopilot. I'm listing some features, before I tell you how to use wifite (which I don't think is necessary at all, as anyone who can understand simple English instructions given by Wifite can use it on his own).   Features Of Wifite Sorts targets by signal strength (in dB); cracks closest access points first Automatically de-authenticates clients of hidden networks to reveal SSIDs Numerous filters to specify exactly what to attack (wep/wpa/both, above certain signal strengths, channels, etc) Customizable settings (timeouts, packets/se...