Situations & Solutions
Choose the situation that best matches your case and follow the detailed instructions.
Instagram Hacked
Step-by-step guide on what to do when your Instagram is hacked and email changed. Learn how to regain control and prevent repeat takeover.
Facebook Hacked
Facebook account hacked? Learn how to identify the takeover, what to do first, and how to regain control. Clear instructions with real scenarios.
Google Account Hacked
Google account hacked? Learn how to regain access to Gmail, YouTube and Drive. Step-by-step recovery guide with security tips from RelyShield.
LinkedIn account hacked
Step-by-step help if your LinkedIn was hacked: spot takeover signs, secure email and sessions, recover access, and avoid scams posing as “LinkedIn support”.
X (Twitter) account hacked
If your X (Twitter) account was hacked: secure email/phone, remove attacker sessions, handle changed @handle or email, and avoid fake support scams.
YouTube channel hacked
YouTube channel hacked or hijacked? Recover Google account access, remove attacker managers, revert branding, and protect AdSense revenue.
TikTok Hacked
TikTok account hacked? Step-by-step guide to recover access, secure your account, and prevent future attacks. Expert help from RelyShield.
WhatsApp Hacked
WhatsApp account hacked? Learn how to recover access, remove the attacker, and secure your account with two-step verification. Guide by RelyShield.
Telegram account taken over
If your Telegram was hacked or someone else receives your codes: act on active sessions, SIM/cloud risks, and official recovery options.
Snapchat account hacked
Snapchat hacked? Learn how to reset access, kick unknown devices, protect email and phone, and handle sextortion-style abuse.
Spotify account hacked
Spotify account hacked? Kick out other devices, fix Facebook login, check subscription changes, and secure your email password.
Steam account hacked
Steam account stolen? Secure email, use Steam Guard, review API keys, revoke authorisations, and understand trade/inventory fraud.
Apple ID / iCloud hacked
Apple ID or iCloud taken over? Learn how to spot changes, use recovery contacts, secure devices, and avoid phishing pretending to be Apple.
Email Hacked
Email hacked? Learn why it's the most serious security problem and how to regain control while protecting all linked accounts.
Business page hacked
Company Facebook or Meta Business Suite hijacked? Prioritise ad spend, roles, Meta Support, and customer communication.
Fake account in my name
Impersonation on social media: report fake profiles, collect evidence, protect friends from scams, and know when to involve authorities.
Blackmail with private photos
If someone threatens to leak intimate images: stay calm, do not pay, preserve evidence, report platforms, and know where to get help.
SIM swap attack
SIM swap fraud: how attackers hijack your phone number, steal SMS codes, and how to work with your carrier and secure accounts.
Password leaked in a data breach
Your password appeared in a breach? Learn why reuse is dangerous, how to rotate passwords safely, and how 2FA and monitoring help.
Suspicious login notification
Got a suspicious login email or push? Learn how to verify real alerts, react safely, and spot fake security notices and phishing.
Locked out of account
Cannot access email, social, or work accounts? Calm recovery order, official channels, and when loops mean a deeper compromise.
Recovery Not Working
Trying to recover your account but nothing works? Learn the most common reasons and what to do when standard recovery gets stuck.
How to Protect Accounts
Practical steps to protect your Instagram, Facebook and other accounts from hacking. Passwords, 2FA, email security and more.
Two-Factor Authentication
Learn what two-factor authentication is, why it matters, and how to enable it on Instagram, Facebook, Google, and TikTok. Practical guide by RelyShield.
Phishing
Learn what phishing is, how to recognize phishing emails and messages, and what to do if you clicked a phishing link. Practical guide by RelyShield.
What is social engineering
Social engineering explained: how attackers manipulate people, common tactics, and practical ways to protect accounts and data.
What is a data breach
What happens in a data breach, why leaked passwords matter, and how to respond with resets, 2FA, and monitoring.
What is a password manager
Password managers explained: how they work, why they beat password reuse, and how to start safely.
What is identity theft
Identity theft basics: how criminals misuse your data, early warning signs, and how securing accounts and credit helps.
How to create a strong password
Strong passwords without nonsense: length, uniqueness, passphrases, and why password managers help.
Can't find your situation?
Get in touch – we'll help even in the most complex cases.
Book a consultation