How to tell if your online accounts have been hacked

Tech Crunch - Mar 25th, 2025
Open on Tech Crunch

A recent trend has emerged where hackers increasingly target everyday individuals to gain access to their bank accounts, steal cryptocurrencies, or stalk them online. While these attacks remain relatively rare, it is crucial for individuals to take preventive measures to secure their online accounts. A comprehensive guide has been released, detailing steps to protect accounts across various platforms like Gmail, Facebook, Apple ID, and others. This guide is regularly updated to provide the latest security practices. It emphasizes the importance of multi-factor authentication and offers methods to check active sessions and suspicious activities on different services.

The implications of these cyber threats extend beyond personal inconvenience, as compromised email accounts often serve as gateways to other sensitive accounts, including banking and healthcare. This highlights the significance of robust security measures. For individuals in high-risk categories, such as journalists or activists, additional precautions are recommended, including seeking expert assistance from organizations like Access Now. As digital interactions grow, understanding and implementing account security becomes increasingly critical, underscoring the need for vigilance in safeguarding personal information online.

Story submitted by Fairstory

RATING

7.0
Fair Story
Consider it well-founded

The article provides a comprehensive guide on securing online accounts, offering practical and actionable advice that is both timely and relevant. Its strengths lie in clarity and readability, making complex cybersecurity concepts accessible to a general audience. While the article effectively addresses public interest by focusing on personal security, it lacks transparency in sourcing and could benefit from more balanced perspectives. The absence of explicit citations or expert endorsements slightly diminishes its credibility, though the advice aligns with established best practices. Overall, the article serves as a valuable resource for readers looking to enhance their online security, despite some areas needing further verification and context.

RATING DETAILS

8
Accuracy

The article provides a detailed guide on securing online accounts, with specific instructions for various platforms like Gmail, Facebook, and Apple. Most of the security features mentioned, such as checking active sessions and enabling multi-factor authentication, are accurate and verifiable through the platforms' settings. However, the claim that hackers are increasingly targeting regular people, while plausible, would benefit from statistical backing or expert testimony to support its prevalence. The article's emphasis on the importance of securing email accounts is a well-established cybersecurity principle, further supporting its accuracy.

7
Balance

The article primarily focuses on providing practical security advice, which limits the range of perspectives presented. While it effectively addresses the concerns of individuals at risk of hacking, such as journalists and activists, it does not explore the broader implications of cybersecurity threats or the perspectives of technology companies. The article could benefit from a more balanced view by including expert opinions on the evolving nature of cyber threats and the responsibilities of service providers.

9
Clarity

The article is well-structured and uses clear, straightforward language to convey complex security concepts. The step-by-step instructions for each platform are logically organized and easy to follow, enhancing the reader's understanding. The tone is neutral and informative, focusing on empowering readers with actionable advice. The logical flow and clarity of information presentation contribute to the article's effectiveness in communicating its message.

6
Source quality

The article does not explicitly cite sources or experts, which affects the perceived credibility of the information. The advice given is consistent with general cybersecurity best practices, suggesting a reliance on widely accepted knowledge. However, the inclusion of authoritative sources or references to studies would enhance the reliability of the claims. The lack of direct attribution makes it difficult to assess the potential biases or conflicts of interest in the reporting.

5
Transparency

The article lacks transparency in terms of its sources and methodology. It does not disclose the basis for its claims about the increase in hacking incidents targeting regular people. While it provides clear instructions for securing accounts, it does not explain the criteria for selecting the platforms discussed or the potential limitations of the security measures. Greater transparency about the article's research process and any potential conflicts of interest would improve its credibility.

Sources

  1. https://techcrunch.com/2024/08/26/how-to-tell-if-your-online-accounts-have-been-hacked/
  2. https://www.cyberpeace.org/resources/blogs
  3. https://techcrunch.com/2025/01/29/hackers-are-hijacking-wordpress-sites-to-push-windows-and-mac-malware/
  4. https://indieweb.org/Twitter
  5. https://techcrunch.com/2025/02/20/hacked-leaked-exposed-why-you-should-stop-using-stalkerware-apps/