Am I hacked? That is a question that you just have to ask yourself. Today is such a moment because a hacker has reportedly published a list of e-mail addresses a la Have I Been Pwned, partially including the passwords. Time to change your passwords, and also immediately set up two-step verification for all your accounts. Here you can read how you do that.
A hacker named d0gberry has indicated to put a search engine online during the day containing a database of all e-mail addresses that have taken place in recent years at large companies such as Yahoo and Dropbox. That database already exists on the Have I Been Pwned website, but the difference is that the new database not only states that your e-mail address appears in the list but also shows the first few characters of your password.
What is clear is that two-step verification (in which you not only enter a password but also receive an SMS with an access code, for example), is not a luxury. In this article, we show you how to set it up for the most important social media, cloud and mail services.
Given that today is the last working day before 1 April, and many companies cannot wait with a joke until that day has actually arrived, it is, of course, possible that the list does not come online at all. In that case, laugh, just read this article and then set up two-step verification for all your online services. Then you are in any case the one who laughs last, instead of the jokers, and certainly not the hackers.
Tip 1 – Stay alert
We are conscious about reducing that chance because it is of course still impossible. It is not that you can set up two-step authentication and then use your password. Hackers will always find ways to circumvent protections, it is up to you to make things as difficult as possible. And as long as there are people who do not use two-step authentication, your secure account is a lot less interesting (because it’s harder to crack). In short, it is never waterproof, but you better have done everything and take your own precautions.
Tip 2 – Google
Google is one of the first accounts that you want to protect, simply because there are probably other accounts associated with it (for example, via the forgot password option). To enable two-step authentication, visit google.com/landing/2step and click Get started> Start Configuration. Enter the mobile phone number where Google can send a code when you sign in to a device that has not previously logged into Google with your account, and then click Submit code. Enter the code you receive and click Verify. Your account is now secured by means of two-step authentication and on this computer and in this browser you no longer need to enter the code (unless you reinstall Windows).
Tip 3 – Google app
In addition to sending codes via SMS, Google has two other methods to give you access to your account. It is just what you like better, you can choose the method that you find useful. In the menu from the previous step, you will also find a cup instead received codes via our mobile app. This option does exactly what it says: via the Google iPhone or Android app you can generate codes when you choose this option. You can also print some codes on paper by clicking on Print or downloading under the Backup codes heading.
Tip 4 – Facebook
The method that Facebook uses is very similar to the method of Google, with the difference that the Facebook app on your smartphone has a built-in code generator (making SMS in that case unnecessary). Log in to Facebook and click on the drop-down menu at the top right and then on Settings> Security. On the page that now appears, click on Registration approvals. Place a checkmark next to the option To request a security code, fill in your telephone number (because texting is possible) and, if desired, enable the Use code generator option. Enter the code that Facebook will send you to confirm your number. Save your changes, and Facebook now has double security.
Tip 5 – Twitter
You might think that Twitter is less disastrous in terms of hacking, but if you use Twitter commercially or automatically post your posts on Facebook, a hacked account can be really harmful. Log in to Twitter, click on your profile photo at the top right and then on Settings> Security and privacy. Now click Add phone, fill in your number and click Continue, then type the verification code in the field and click Activate phone. Then click on Security and Privacy again and place a checkmark next to Send login request requests to my phone. A test code is now sent, and as soon as you confirm it, the two-step verification is set.
Tip 6 – LinkedIn
You should not think that a hacker gains access to the social network on which you manage all your professional contacts? Fortunately, LinkedIn also has two-step authentication. Log in to LinkedIn, click on your profile picture and then on Privacy & Settings> Account> Manage security settings. On the page that appears, click Turn on under the heading Two-step verification for sign-in. Then enter your mobile phone number and click Send Code. You will now receive a code by text message that you enter in your browser, after which you click on Verify. Two-step authentication will also better protect your LinkedIn account from now on.
Tip 7 – Apple ID
Do you use Apple devices? Then a hacked Apple ID can put you in the financial problems because in many cases this ID is linked to your credit card. You can set up two-step authentication by browsing to appleid.apple.com and logging in with your Apple ID. Enter the answer to your security questions and then click on Get Started under the Two-Step Verification heading. Now specify which devices can receive the security code (such as iPhone, iPad, etc.). When you try to sign in with your Apple ID somewhere, Apple will send a code to the specified devices that you need to use to sign in.
Tip 8 – Microsoft
You can also provide extra security for your Microsoft account. Fine, because payment information can now also be linked to this account (for Office, for example). Surf to account.microsoft.com and log in with your Microsoft account. Click Security and privacy> More security settings. Scroll to the Two-step Verification header and click Set Up Verification in Two Steps. Microsoft also offers the SMS option but would prefer that you install a verification app. Choose which smartphone you want to use and click Next. Install the app (named verifier) on your smartphone and scan the code that Microsoft shows. The app now gives a code, which you must enter on the site. click on Next to finalize the two-step authentication.
What if you lost your codes?
Safety is important, but it comes with one big risk: that you exclude yourself. Because what if your smartphone was stolen and you had not downloaded the Google codes? Well, in theory, it means that you will never have access to your account again. In reality, that is slightly more nuanced, because of course there are people working at all these sites, not robots. So if you really do not have access to your account anymore, please contact the relevant service. What they will ask you to give you access to your account differs, but keep in mind that things will go as passports and other identification methods. We consider this to be very positive because it means that a malicious person cannot just get the control of your account in this way.
Tip 9 – Yahoo
Yahoo is the umpteenth major service that gets a lot of leaks. The data of up to 500 million users were thrown out on the street, so if you ever had a Yahoo account, you are likely to be there. Fortunately, Yahoo also offers two-step authentication.
To do this, log in to your account, hover over your username and click on Account info. Under the Account security tab, first, choose the option to change your password. Then you will find a bit further down the Two-step verification option. Enter your phone number, enter the code you receive and click on Verify. If malicious people try to get into your account now, you will notice it automatically.
READ ALSO: 7 tips to find the best password manager