Situations & Solutions

Choose the situation that best matches your case and follow the detailed instructions.

Instagram Hacked

Step-by-step guide on what to do when your Instagram is hacked and email changed. Learn how to regain control and prevent repeat takeover.

Facebook Hacked

Facebook account hacked? Learn how to identify the takeover, what to do first, and how to regain control. Clear instructions with real scenarios.

Google Account Hacked

Google account hacked? Learn how to regain access to Gmail, YouTube and Drive. Step-by-step recovery guide with security tips from RelyShield.

LinkedIn account hacked

Step-by-step help if your LinkedIn was hacked: spot takeover signs, secure email and sessions, recover access, and avoid scams posing as “LinkedIn support”.

X (Twitter) account hacked

If your X (Twitter) account was hacked: secure email/phone, remove attacker sessions, handle changed @handle or email, and avoid fake support scams.

YouTube channel hacked

YouTube channel hacked or hijacked? Recover Google account access, remove attacker managers, revert branding, and protect AdSense revenue.

TikTok Hacked

TikTok account hacked? Step-by-step guide to recover access, secure your account, and prevent future attacks. Expert help from RelyShield.

WhatsApp Hacked

WhatsApp account hacked? Learn how to recover access, remove the attacker, and secure your account with two-step verification. Guide by RelyShield.

Telegram account taken over

If your Telegram was hacked or someone else receives your codes: act on active sessions, SIM/cloud risks, and official recovery options.

Snapchat account hacked

Snapchat hacked? Learn how to reset access, kick unknown devices, protect email and phone, and handle sextortion-style abuse.

Spotify account hacked

Spotify account hacked? Kick out other devices, fix Facebook login, check subscription changes, and secure your email password.

Steam account hacked

Steam account stolen? Secure email, use Steam Guard, review API keys, revoke authorisations, and understand trade/inventory fraud.

Apple ID / iCloud hacked

Apple ID or iCloud taken over? Learn how to spot changes, use recovery contacts, secure devices, and avoid phishing pretending to be Apple.

Email Hacked

Email hacked? Learn why it's the most serious security problem and how to regain control while protecting all linked accounts.

Business page hacked

Company Facebook or Meta Business Suite hijacked? Prioritise ad spend, roles, Meta Support, and customer communication.

Fake account in my name

Impersonation on social media: report fake profiles, collect evidence, protect friends from scams, and know when to involve authorities.

Blackmail with private photos

If someone threatens to leak intimate images: stay calm, do not pay, preserve evidence, report platforms, and know where to get help.

SIM swap attack

SIM swap fraud: how attackers hijack your phone number, steal SMS codes, and how to work with your carrier and secure accounts.

Password leaked in a data breach

Your password appeared in a breach? Learn why reuse is dangerous, how to rotate passwords safely, and how 2FA and monitoring help.

Suspicious login notification

Got a suspicious login email or push? Learn how to verify real alerts, react safely, and spot fake security notices and phishing.

Locked out of account

Cannot access email, social, or work accounts? Calm recovery order, official channels, and when loops mean a deeper compromise.

Recovery Not Working

Trying to recover your account but nothing works? Learn the most common reasons and what to do when standard recovery gets stuck.

How to Protect Accounts

Practical steps to protect your Instagram, Facebook and other accounts from hacking. Passwords, 2FA, email security and more.

Two-Factor Authentication

Learn what two-factor authentication is, why it matters, and how to enable it on Instagram, Facebook, Google, and TikTok. Practical guide by RelyShield.

Phishing

Learn what phishing is, how to recognize phishing emails and messages, and what to do if you clicked a phishing link. Practical guide by RelyShield.

What is social engineering

Social engineering explained: how attackers manipulate people, common tactics, and practical ways to protect accounts and data.

What is a data breach

What happens in a data breach, why leaked passwords matter, and how to respond with resets, 2FA, and monitoring.

What is a password manager

Password managers explained: how they work, why they beat password reuse, and how to start safely.

What is identity theft

Identity theft basics: how criminals misuse your data, early warning signs, and how securing accounts and credit helps.

How to create a strong password

Strong passwords without nonsense: length, uniqueness, passphrases, and why password managers help.

Can't find your situation?

Get in touch – we'll help even in the most complex cases.

Book a consultation