Phishing
Phishing works by pretending to be a trusted brand, colleague, bank, delivery service, or support team to steal access or payment details.
Example: A fake message says your Microsoft 365 password expires today and asks you to sign in through a link that looks familiar but is controlled by an attacker.
Warning signs
- Urgent requests that pressure you to act immediately
- Links that lead to a lookalike login page
- Messages that ask for passwords, codes, or card details
What to do
- Do not click the link or download the file
- Verify the request through the official website or known contact
- Change credentials quickly if you already entered them
Data leaks
A data leak happens when information from a service, database, or business system becomes exposed and starts circulating outside its intended environment.
Example: An old account from a service you rarely use appears in a breach, and attackers begin trying the same password across your email, social media, and work accounts.
Warning signs
- Unexpected password reset attempts
- Login alerts from services you have not touched recently
- Reused passwords across multiple important accounts
What to do
- Change passwords beginning with email and high-value accounts
- Enable multi-factor authentication where possible
- Review recovery settings, devices, and active sessions
Malware
Malware is harmful software designed to steal information, damage systems, spy on activity, or give attackers a foothold inside a device.
Example: A fake software update installs quietly, then the device slows down, browsers behave strangely, and saved credentials begin to disappear.
Warning signs
- Pop-ups, unknown programs, or browser changes you did not make
- Unexpected device slowdown or background activity
- Security warnings appearing after a suspicious download
What to do
- Stop using the device for sensitive accounts until it is reviewed
- Avoid deleting evidence before understanding the issue
- Reset exposed credentials after cleanup is confirmed
Account hacking
Account compromise happens when someone gains access to an email, social account, payment platform, or business tool and starts changing control settings or misusing identity.
Example: A reused password from an old breach lets an attacker enter your inbox, change recovery details, and impersonate you with clients or family members.
Warning signs
- Password changes or recovery changes you did not request
- Sent messages, charges, or account activity you do not recognize
- Being locked out of an account that worked moments earlier
What to do
- Try to recover the account through official recovery flows immediately
- Change related passwords on any reused accounts
- Review linked services, payment methods, and forwarding rules