Technology
How to tell if your online accounts have been hacked

More and more hackers are targeting regular individuals with the goal of stealing their crypto, perhaps moving into their bank accounts, or just stalking them. These varieties of attacks are still relatively rare, so there’s no need for alarm. But it’s vital to know what you possibly can do to protect yourself if you watched someone got into your email or social media account.
A number of years ago, I wrote a guide to help people protect themselves, and understand that almost all of the businesses you have an account with already give you tools to take control of your accounts’ security, even before you contact them for help, which in some cases you continue to should do.
Here we break down what you possibly can do on several different online services.
Just like within the previous guide, there’s a vital caveat. You should know that these methods don’t guarantee that you simply haven’t been compromised. If you continue to aren’t sure, you need to contact knowledgeable, especially if you’re a journalist, a dissident or activist, or otherwise someone who has the next risk of being targeted. In those cases, the non-profit Access Now has a digital security helpline that can connect you to one in all their experts.
Another caveat, if you don’t do that already, you need to enable multi-factor authentication on all your accounts, or at the least a very powerful ones (email, banking, social media). This directory is an important resource that teaches you the way to enable multi-factor authentication on greater than 1,000 web sites. (Note that you simply don’t have to use the multi-factor app promoted on that site, there are plenty of other alternatives.)
Increasingly some online services offer using a physical security key or a passkey stored in your password manager, which is one in all the best safeguards to prevent account intrusions that depend on password-stealing malware or phishing.
Gmail lists all of the places your account is energetic
The very first thing you need to do if you watched someone has broken into your Gmail account (and by extension all the opposite Google services linked to it) is to scroll all the best way down in your inbox until you see “Last account activity” in the underside right corner.
Click on “Details.” You will then see a pop-up window that appears like this:
These are all of the places where your Google account is energetic. If you don’t recognize one in all them, for instance if it comes from a distinct location, like a rustic you haven’t visited recently or never been, then click on “Security Checkup.” Here you possibly can see what devices your Google account is energetic in.
If you scroll down, you too can see “Recent security activity.”
Check this list to see if there are any devices that you simply don’t recognize. If in any of those places above you see something suspicious, click on “See unfamiliar activity?” and alter your password:
After you modify your password, as Google explains here, you will probably be signed out of each device in every location, except on the “devices you use to verify that it’s you when you sign in,” and a few devices with third-party apps that you simply’ve granted account access to. If you would like to sign on the market too, go to this Google Support page and click on on the link to “View the apps and services with third-party access.”
Finally, we also suggest considering turning on Google’s Advanced Protection on your account. This enhanced security protection makes phishing your password and hacking into your Google account even harder. The drawback is that you simply need to purchase security keys, hardware devices that function a second-factor. But we expect this method is vital and a must-use for people who find themselves at the next risk.
Also, do not forget that your email account is probably going linked to all your other vital accounts, so moving into it could end up to be step one into hacking into other accounts. That’s why securing your email account is more vital than virtually some other account.
Outlook and Microsoft logins are within the account settings
If you’re concerned about hackers having accessed your Microsoft Outlook account, you possibly can check “when and where you’ve signed in,” as Microsoft puts it within the account settings.
To go to that page, go to your Microsoft Account, click on Security on the left-hand menu, after which under “Sign-in activity” go to “View my activity.”
At this point, you need to see a page that shows recent logins, what platform and device was used to log in, the variety of browser, and the IP address.
If something looks off, click on “Learn how to make your account more secure,” where you possibly can change your password, check “how to get better a hacked or compromised account“, and more.
Microsoft also has a support portal with information on the Recent activity page.
As we noted above, your email account is the cornerstone of your online security, provided that it’s likely that almost all of your vital accounts — think social media, bank, and healthcare provider etc. — are linked to it. It’s a preferred goal for hackers who want to then compromise other accounts.
Like other email providers, Yahoo (which owns TechCrunch) also offers a tool to check your account and sign-in activity with the goal of allowing you to see any unusual activity that could possibly be an indication of compromise.
To access this tool, go to your Yahoo My Account Overview or click on the icon with your initial next to the e-mail icon on the highest right corner, and click on on “Manage your account.”
Once there, click on “Review recent activity.” On this page you’ll give you the option to see recent activity on your account, including password changes, phone numbers added, and what devices are connected to your account, and their corresponding IP addresses.
Given that it is probably going that you simply have linked your email address to sensitive web sites like your bank’s, your social media accounts, and healthcare portals, amongst others, you need to make an additional effort to secure it.
Ensure your Apple ID is secure
Apple allows you to check what devices your Apple ID is logged in directly through the iPhone and Mac system settings, as the corporate explains here.
On an iPhone or iPad, go to “Settings,” tap your name, and scroll down to see all of the devices that you simply are signed in on.
On a Mac, click on the Apple logo on the highest left corner, then “System Settings,” then click on your name, and also you may even see an inventory of devices, similar to on an iPhone or iPad.
If you click on any device, Apple says, you’ll give you the option to “view that device’s information, such as the device model, serial number,” and operating system version.
On Windows, you should use Apple’s iCloud app to check what devices are logged into your account. Open the app, and click on on “Manage Apple ID.” There you possibly can view the devices and get more information on them.
Finally, you too can get this information through the net, going to your Apple ID account page, then clicking on “Devices” within the left hand menu.
How to check Facebook and Instagram security
The social networking giant offers a feature that allows you to see where your account is logged in. Head to Facebook’s “Password and Security” settings and click on on “Where you’re logged in.”

In the identical interface you too can see where you’re logged in with your Instagram account, provided it’s linked to your Facebook account. If the accounts should not linked, or you simply don’t have a Facebook account, go to Instagram’s “Account Center” to manage your Instagram account and click on on Password and Security, after which “Where you’re logged in.”
Here you possibly can select to sign off from specific devices, perhaps since you don’t recognize them, or because they’re old devices you don’t use anymore.
Just like Google, Facebook offers an Advanced Protection feature in addition to for Instagram, which essentially makes it harder for malicious hackers to log onto your account. “We’ll apply stricter rules at login to reduce the chances of unauthorized access to your account,” the corporate explains. “If we see anything unusual about a login to your account, we’ll ask you to complete extra steps to confirm it’s really you.”
If you’re a journalist, a politician, or otherwise someone who’s more likely in danger to be targeted by hackers, you could want to activate this feature.
It’s easy to see whether your WhatsApp is secure
In the past, it was only possible to use WhatsApp on one mobile device only. Now, Meta has added functionalities for WhatsApp users to use the app on computers, and likewise directly via browser.
Checking where you logged in with your WhatsApp account is easy. Open the WhatsApp app on your cell phone. On iPhones and iPads, tap on the Settings icon in the underside right corner, then tap on “Linked devices.”
There, you’ll give you the option to see an inventory of devices, and by clicking on one in all them you possibly can log them out.
On Android, tap on the three dots in the highest right corner of the WhatsApp app, then tap “Linked devices” and you will notice a page that’s very similar to what you’d see on Apple devices.
Signal also allows you to check for anomalies
Like WhatsApp, Signal now allows you to use the app via dedicated Desktop apps for macOS, Windows, in addition to Linux.
From this screen of Linked Devices, you possibly can tap on “Edit” and take away the devices, which implies your account will probably be logged out and unlinked from those devices.
X (Twitter) allows you to see what sessions are open
To see where you’re logged into X (formerly Twitter), go to X Settings, then click on “More” on the left hand menu, click on “Settings and privacy,” then “Security and account access,” and eventually “Apps and sessions.”
From this menu, you possibly can see what apps you have connected to your X account, what sessions are open (equivalent to where you’re logged in), and the access history of your account.
You can revoke access to all other devices and locations by hitting the “Log out of all other sessions” button.
Technology
One of the last AI Google models is worse in terms of safety

The recently released Google AI model is worse in some security tests than its predecessor, in line with the company’s internal comparative test.
IN Technical report Google, published this week, reveals that his Flash Gemini 2.5 model is more likely that he generates a text that violates its security guidelines than Gemini 2.0 Flash. In two indicators “text security for text” and “image security to the text”, Flash Gemini 2.5 will withdraw 4.1% and 9.6% respectively.
Text safety for the text measures how often the model violates Google guidelines, making an allowance for the prompt, while image security to the text assesses how close the model adheres to those boundaries after displaying the monitors using the image. Both tests are automated, not supervised by man.
In an e-mail, Google spokesman confirmed that Gemini 2.5 Flash “performs worse in terms of text safety for text and image.”
These surprising comparative results appear when AI is passing in order that their models are more acceptable – in other words, less often refuse to answer controversial or sensitive. In the case of the latest Llam Meta models, he said that he fought models in order to not support “some views on others” and answers to more “debated” political hints. Opeli said at the starting of this yr that he would improve future models, in order to not adopt an editorial attitude and offers many prospects on controversial topics.
Sometimes these efforts were refundable. TechCrunch announced on Monday that the default CHATGPT OPENAI power supply model allowed juvenile to generate erotic conversations. Opeli blamed his behavior for a “mistake”.
According to Google Technical Report, Gemini 2.5 Flash, which is still in view, follows instructions more faithfully than Gemini 2.0 Flash, including instructions exceeding problematic lines. The company claims that regression might be partially attributed to false positives, but in addition admits that Gemini 2.5 Flash sometimes generates “content of violation” when it is clearly asked.
TechCrunch event
Berkeley, California
|.
June 5
Book now
“Of course, there is a tension between (after instructions) on sensitive topics and violations of security policy, which is reflected in our assessment,” we read in the report.
The results from Meepmap, reference, which can examine how models react to sensitive and controversial hints, also suggest that Flash Gemini 2.5 is much less willing to refuse to reply controversial questions than Flash Gemini 2.0. Testing the TechCrunch model through the AI OpenRoutter platform has shown that he unsuccessfully writes essays to support human artificial intelligence judges, weakening the protection of due protection in the US and the implementation of universal government supervisory programs.
Thomas Woodside, co -founder of the Secure AI Project, said that the limited details given by Google in their technical report show the need for greater transparency in testing models.
“There is a compromise between the instruction support and the observation of politics, because some users may ask for content that would violate the rules,” said Woodside Techcrunch. “In this case, the latest Flash model Google warns the instructions more, while breaking more. Google does not present many details about specific cases in which the rules have been violated, although they claim that they are not serious. Not knowing more, independent analysts are difficult to know if there is a problem.”
Google was already under fire for his models of security reporting practices.
The company took weeks to publish a technical report for the most talented model, Gemini 2.5 Pro. When the report was finally published, it initially omitted the key details of the security tests.
On Monday, Google published a more detailed report with additional security information.
(Tagstotransate) Gemini
Technology
Aurora launches a commercial self -propelled truck service in Texas

The autonomous startup of the Aurora Innovation vehicle technology claims that it has successfully launched a self -propelled truck service in Texas, which makes it the primary company that she implemented without drivers, heavy trucks for commercial use on public roads in the USA
The premiere appears when Aurora gets the term: In October, the corporate delayed the planned debut 2024 to April 2025. The debut also appears five months after the rival Kodiak Robotics provided its first autonomous trucks to clients commercial for operations without a driver in field environments.
Aurora claims that this week she began to freight between Dallas and Houston with Hirschbach Motor Lines and Uber Freight starters, and that she has finished 1200 miles without a driver to this point. The company plans to expand to El Paso and Phoenix until the top of 2025.
TechCrunch contacted for more detailed information concerning the premiere, for instance, the variety of vehicles implemented Aurora and whether the system needed to implement the Pullover maneuver or the required distant human assistance.
The commercial premiere of Aurora takes place in a difficult time. Self -propelled trucks have long been related to the necessity for his or her technology attributable to labor deficiencies in the chairman’s transport and the expected increase in freigh shipping. Trump’s tariffs modified this attitude, not less than in a short period. According to the April analytical company report from the commercial vehicle industry ACT researchThe freight is predicted to fall this yr in the USA with a decrease in volume and consumer expenditure.
Aurora will report its results in the primary quarter next week, i.e. when he shares how he expects the present trade war will affect his future activity. TechCrunch contacted to learn more about how tariffs affect Auror’s activities.
For now, Aurora will probably concentrate on further proving his safety case without a driver and cooperation with state and federal legislators to just accept favorable politicians to assist her develop.
TechCrunch event
Berkeley, California
|.
June 5
Book now
At the start of 2025, Aurora filed a lawsuit against federal regulatory bodies after the court refused to release the appliance for release from the protection requirement, which consists in placing warning triangles on the road, when the truck must stop on the highway – something that’s difficult to do when there isn’t a driver in the vehicle. To maintain compliance with this principle and proceed to totally implement without service drivers, Aurora probably has a man -driven automotive trail after they are working.
(Tagstranslate) Aurora Innovation
Technology
Sarah Tavel, the first woman of the Benchmark GP, goes to the Venture partner

Eight years after joining Benchmark as the company’s first partner, Sarah Tavel announced that she was going to a more limited role at Hapeure Venture.
In his latest position as a partner Venture Tavel will proceed to invest and serve existing company boards, but may have more time to examine “AI tools on the edge” and fascinated with the direction of artificial intelligence, she wrote.
Tavel joined Benchmark in 2017 after spending a half years as a partner in Greylock and three years as a product manager at Pinterest. Before Pinterest, Tavel was an investor in Bessemer Venture Partners, where she helped Source Pinterest and Github.
Since its foundation in 1995, the benchmark intentionally maintained a small team of six or fewer general partners. Unlike most VC corporations, wherein older partners normally receive most of the management and profits fees, the benchmark acts as an equal partnership, and all partners share fees and returns equally.
During his term as a general partner of Benchmark, Tavel invested in Hipcamp on the campsite, chains of cryptocurrency intelligence startups and the Supergreaty cosmetic platform, which was purchased by Whatnot in 2023. Tavel also supported the application for sharing photos of Paparazhi, which closed two years ago, and the AI 11x sales platform, about which TechCrunch wrote.
(Tagstotransate) benchmark
-
Press Release1 year ago
U.S.-Africa Chamber of Commerce Appoints Robert Alexander of 360WiseMedia as Board Director
-
Press Release1 year ago
CEO of 360WiSE Launches Mentorship Program in Overtown Miami FL
-
Business and Finance11 months ago
The Importance of Owning Your Distribution Media Platform
-
Business and Finance1 year ago
360Wise Media and McDonald’s NY Tri-State Owner Operators Celebrate Success of “Faces of Black History” Campaign with Over 2 Million Event Visits
-
Ben Crump1 year ago
Another lawsuit accuses Google of bias against Black minority employees
-
Theater1 year ago
Telling the story of the Apollo Theater
-
Ben Crump1 year ago
Henrietta Lacks’ family members reach an agreement after her cells undergo advanced medical tests
-
Ben Crump1 year ago
The families of George Floyd and Daunte Wright hold an emotional press conference in Minneapolis
-
Theater1 year ago
Applications open for the 2020-2021 Soul Producing National Black Theater residency – Black Theater Matters
-
Theater11 months ago
Cultural icon Apollo Theater sets new goals on the occasion of its 85th anniversary