How to fix a hacked email account

Here’s a useful guide that could help if you ever fall victim to an email hacker. If you follow this guide you will never have to send “sorry everyone, my email account was hacked” email again.

How to fix a hacked email account?
How to fix a hacked email account?

Almost every online user experiences hack on their email account some time or another. In many cases, victims simply change their password and send out an “I’m sorry everyone, but my email account got hacked – again!” email to all their contacts. While both these steps are good to follow there is more you can do and should think about. For instance, what if the hacker added a forwarding email address on your account?


If it does happen that you email account got hacked or even if you would just like to up your overall security, iWits suggests following these easy steps.

  • Regain access of your account
    In the event that your email account got hacked the first step would be to regain access to your account. Hacker’s do not always change passwords and there are plenty of scenarios where they simply log in and send out a mass email to your contacts before moving on to the next victim. So first use the “Forgot Password” option to reset your password and regain control of your account.
  • Kick out active logins
    Find out if anyone is currently accessing your account by glancing over your active logins. On Gmail you simply scroll to the bottom, click on the “Details” link in the bottom right corner and then “Last account activity”. If you see any suspicious logins, use the link provided to kick them out.
  • Check your settings
    Go to your email account settings and ensure that the hacker hasn’t changed any of your settings which will give them access to your account in future. For instance, ensure that your secondary (recovery) email is still active.

    Also ensure that the hacker did not introduce any forwarding rules.
  • Re-enter your password on all devices
    Remember to change your new (more secure) password on all of your devices.
  • Inform your friends & family
    Hackers will often use your email account to distribute malicious software by emailing your contacts as they already trust you they are more likely to click on links from your account.

    Send a warning email to everyone in your contacts informing them that your account has been hacked and that they should not click on any links or open any suspicious emails from your account.
  • Implement two-factor authentication
    If your email account has been hacked, it is safe to assume that you have not implemented a two-step authentication, which is the best line of defence.

    When 2-way authentication is enabled, logging into to your email account requires one extra step. After entering your password, a code is sent to your cell phone which is also entered before you can access your email account. This means that unless hackers gain access of your cell phone there is no way to hack into the account – even if they have the password. Click on the link below to find out how you can set this up on several email accounts and social media platforms.

    http://www.cnet.com/how-to/how-to-enable-two-factor-authentication-on-popular-sites/
  • Change your password on other sites
    Several of tech and security experts passionately recommend against recycling your password, because if a hacker has obtained your password it becomes quite easy to access your other accounts using the same password. If you are a password recyclers, change your password on ALL of your devices now and remember DO NOT USE THE SAME PASSWORD ON ALL OF YOUR DEVICES. Try to use different passwords for each account.
  • Avoid phishing traps in future
    There is a large number of tactics used by hackers that it becomes difficult to figure out how you fell victim in the first place. One of the most common (and successful) methods is through phishing attacks. Click on the link below to see how you can avoid such phishing attacks in the future.

    http://www.techrepublic.com/blog/10-things/10-tips-for-spotting-a-phishing-email/
  • Run a malware scan
    Whether the hacker used malware to gain access to your email account or it was simply installed as a result of an email received with a malicious link, now is a good time to run a malware scan. There are several of options available online: Avast, Malwarebytes, and BitDefender which are some of the more popular scanners.
  • Stop using easy passwords
    Whether or not your password was changed, now is a good time to choose a new password. For hard-to-crack passwords use several characters including uppercase letters, lowercase letters, symbols and even spaces.

    You can test the strength of your password before using it by visiting https://howsecureismypassword.net/

Related Posts

  • Credit: Google Doodle

    How I learned, using Google

    Unlike some of my friends, I grew up with no internet access, while they were turning to Google to do research for school I had to mosey on down to the local library where I had to rely on outdated books and encyclopaedias for the information I needed. ...

    read more
  • Ecommerce Challenges

    Namibia’s Ecommerce Challenges

    The term eCommerce refers to the purchasing and selling of products online using various electronic methods to complete the transaction. While this form of online shopping has been quickly adopted in many countries throughout the globe, Namibia has however not fared so well. Many may argue that the main reason for this is the adoption rate of mo...

    read more
  • Online advertising

    Reference Guide: Online Advertising in Namibia

    Online Advertising, if used correctly, can be an extremely powerful marketing tool that does not only help companies promote their products and services online, but it promotes the products and services to people who have shown interest – or that is how Online Advertising should work. ...

    read more
  • Mmmmmm.....Cookie!

    Cookies... Not just for dunking in Milk!

    Cookies are used both in real-life and online, the main difference being real-life cookies can be used to store Milk which is then transferred to your mouth and stomach, while digital cookies are used to store data which is transferred to websites. It’s not really that simple, but in a nutshell that is the main purpose of a cookie. ...

    read more
  • What are domain names and how do they work?

    Domain Names: Everything you need to know

    A domain name is something that is used by every person browsing the internet, whether you know what it is or how to use it, it still exists. ...

    read more
  • Phishing emails

    10 Tips to Spot a Phishing Email

    Phishing emails come and go all year-round, especially during holidays, thus it is important that you learn how to spot “fishy” emails before you click on them. ...

    read more


This is an unsafe browser and you're vulnerable to being Hacked

Your browser is so unsafe that Hackers could get FULL ACCESS to your entire Computer, via remote access. iWits HIGHLY RECOMEND upgrading your browser for your own protection. Click on any of the three links below to find out more.
The Hacker News | Win Beta (Microsoft news and more) | Laxmikant Patil

To ensure your safty always upgrade software on your Computer. Almost 90% of upgrades are security related. So start by upgrading your browser with the link below: