What should You Do After You’ve Been Hacked


R










De-Authorize All Those Apps
This is one of those non-obvious but important steps. One of the first things you should probably do if you’ve had an account compromise is de-authorize all the associated apps that use that account for login or for its social graph. For example, Google, Twitter, Facebook, Dropbox and many others support OAuth, which enables third party apps to use account APIs without having to give them the account login information. But if a hacker has used it to authorize another device or service, and remains logged in there, simply changing your password won’t get them out. There could be a rogue client out there that you remain unaware of even after regaining access to your account. The best bet is to pull the plug on everything you’ve given access to are on Google, Facebook and Twitter. It may be a pain to go back through and re-authorize them, but it’s less so than leaving a malicious individual lurking in your account. And in any case, doing so periodically is just good hygene.



No comments:

Post a Comment