I will never forget the call on my national radio show where her brother called me for guidance after being scammed out of $450,000. He trusted the wrong person, but he is never alone. People just don’t realize they’re on board until it’s too late.

Then clues emerge. You may have sent a large number of gift card codes, or you may have leftover emails in your outbox. Worse still, you may get loan notifications in your name. Tips from the pros: That’s why free credit report every year.

This is also why we check the security of your Google account. In just a minute, you’ll know who has access to your account. I’m sorry, it’s just you.

Exposure: Reveal Apple and Microsoft tracking secrets while working on Mac or PC

509,000 people get my free tech newsletter.

60 seconds safety check

We’ll show you how to find digital clues that hackers compromised your account, but that’s not all. This tip can also help you identify snoops. Is a friend or family member spying on your girlfriend’s Google account or her Gmail account?

  • go to google.com/devices. Sign in if you are not already signed in.
  • Here you’ll see a list of devices such as computers, smartphones, and tablets that you’re signed in to or have signed in to in the last 28 days.

Click on each to see which browser was used. It may be information that someone else is logged in. For example, let’s say Chrome is visible, but you’re only using Safari.

Google headquarters in Mountain View, California. (Marlena Sloss/Bloomberg, via Getty Images, File)

Don’t panic if the same device appears multiple times. Each session (or logged-in instance) is recorded.

You may also see devices that have not been used for a long time, such as old phones or computers that you no longer use. It’s wise to sign out of these devices remotely.

  • Click on what you need sign out. This will permanently remove access to your Google Account from your device.

You’ll also need to do this for any devices you used to access your account, such as a friend’s tablet or work computer.

I sent clever security tips by email almost every day. Get our free newsletter here.

What happens to personal information after a data breach?

here is a red flag

What if you see a computer, phone, tablet, or device that you don’t recognize? That might be a bad sign, but don’t panic right away.

You may have signed in to a different city because you signed in via VPN or were on vacation. Or if you borrowed the device from someone else.

If you don’t remember, or if you’re sure it wasn’t you, do the following:

  • Click to select your device Is there something you don’t recognize? or sign out. Again, this will sign out the device remotely.

Is your inbox a mess?Here’s how to make sure your email is checked

Google Chrome and GMail apps on mobile phone screen. (Fabian Sommer/Photo Alliance via Getty Images, File)

Protect your account now

Take a conservative approach when it comes to cybersecurity.maybe it was You, but someone else may have compromised your account.

In other words, it’s time to change the password to prevent those who have logged in from logging in again. stop it Reuse your old password or choose something easy to guess.

Bonus tip: Follow Google’s memory

Google’s Timeline feature gives you an overview of where you’ve been, including travel times, routes, and even photos taken upon arrival. If you haven’t already, it’s worth checking out.

  • go to timeline.google.com
  • Search for a date or click one. blue bar It’s below the date field. There you can see the places you’ve visited, the routes you’ve taken, the photos you’ve taken, and the timestamps of everything.
  • At the bottom is a red box showing the number of locations tracked by Google. Click on it to see the most visited places.

Google landing page. (Fox News)

If this whole exercise creeps you out, click the blue button at the bottom. Manage location history.

  • You can choose from here erase or Turn off and delete activity.
  • You’ll also see a checkbox for each device associated with your account that has access to Location History.

The more you know!

maintain technical knowledge

My popular podcast is called “”kim commando today. This is his 30 minute jam packed with tech news, tips, and callers with tech questions like you from all over the country. Search anywhere you can get a podcast. For your reference, click the link below for the latest episode.

Podcast Recommendations: Hire online killers, AI lifeguards and fake travel guides

Besides, are you worried about ChatGPT scraping your data? Here’s how to stop it. Others are finding creative ways to make money renting Starlink satellites. Don’t miss Google’s latest gadgets, car-money opportunities, and repeatable tech travel tips.

My popular podcast is called “”kim commando today. This is his 30 minute jam packed with tech news, tips, and callers with tech questions like you from all over the country. Search anywhere you can get a podcast. For your reference, click the link below for the latest episode.

Check out my podcast Today’s Kim Commando. apple, google podcasts, spotifyor your favorite podcast player.

CLICK HERE TO GET THE FOX NEWS APP

Listen to the podcast here Or anywhere you can get a podcast. Search for my last name “Commando”.

Sound like a tech pro, even if you aren’t. Popular award-winning host Kim Commando is your secret weapon. listen 425+ radio stations or get the podcast. Join over 400,000 people Get our free 5 minute email newsletter every day.

Copyright 2023, WestStar Multimedia Entertainment. All rights reserved.

Share.

TOPPIKR is a global news website that covers everything from current events, politics, entertainment, culture, tech, science, and healthcare.

Leave A Reply

Exit mobile version