Someone can still access my emails despite me signing out of all devices and turning on 2FA [closed]

This is seriously bugging me. Starting from yesterday, someone has been signing up to many different temp jobs (Uber, Doordash, etc) using one of my email accounts (gmail). Initially, I thought it was a spam attempt to obscure important em… Continue reading Someone can still access my emails despite me signing out of all devices and turning on 2FA [closed]

What "indicators of compromise" are there that end users can diagnose themselves?

I’m responsible for the IT security of a small (~5 users) office, and I’m preparing training materials for our users.
Obviously, the first step my users should do if anything seems suspicious is to keep calm and contact me. However, if I’m… Continue reading What "indicators of compromise" are there that end users can diagnose themselves?

I’m getting hacked, can’t do a thing to stop it. my iphone, my personal computer [closed]

iphone11 and my personal pc have been hacked. I’d like to know the basics of how they did it and how i can stop it.
is it done by remotely, or does someone need to be within distance of my wifi and hack it that way? or by contact with my p… Continue reading I’m getting hacked, can’t do a thing to stop it. my iphone, my personal computer [closed]

Can VPN protect me against MITM attacks if my device is already compromised by having a malicious root certificate installed?

Let’s say my device is already compromised without my knowledge by my ISP, it has a malicious root certificate installed which allows my ISP to view all of my HTTPS traffic as plain text.
now if I use a secure paid VPN like OpenVPN or Wire… Continue reading Can VPN protect me against MITM attacks if my device is already compromised by having a malicious root certificate installed?