{"id":80058,"date":"2024-07-20T20:15:08","date_gmt":"2024-07-20T12:15:08","guid":{"rendered":"https:\/\/version-2.com\/?p=80058"},"modified":"2024-07-16T20:20:11","modified_gmt":"2024-07-16T12:20:11","slug":"what-to-do-if-a-scammer-has-your-email-address","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/07\/what-to-do-if-a-scammer-has-your-email-address\/","title":{"rendered":"What to do if a scammer has your email address"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"80058\" class=\"elementor elementor-80058\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2493f1c elementor-widget elementor-widget-text-editor\" data-id=\"2493f1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/a.storyblok.com\/f\/157611\/1200x627\/c9399fef02\/scammer-has-email.png\/m\/1080x0\/filters:quality(75)\" width=\"1080\" height=\"564\" \/><\/p><div class=\"richtext\"><h2 id=\"can-you-tell-who-has-your-email-address\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">Can you tell who has your email address?<\/h2><p class=\"nord-text text-base leading-normal text-black\">Initially just a method for sending letter-like messages across the internet, email has now become an integral part of everyone\u2019s digital lives. We use it when signing up for services, creating app accounts, sharing files with our friends and colleagues, shopping online, and more \u2013 essentially making email a virtual equivalent of an ID card.<\/p><p class=\"nord-text text-base leading-normal text-black\">Given its various applications, it&#8217;s easy to lose track of who has our email address. Most users wouldn\u2019t be able to name everyone who knows their email if asked. Consequently, many people may not realize that their email address has fallen into the hands of someone who might exploit it for personal gain.<\/p><p class=\"nord-text text-base leading-normal text-black\">If you\u2019re concerned, let us help you find out if your email address has been compromised and understand why it might have been.<\/p><h2 id=\"how-to-tell-if-a-scammer-has-your-email\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">How to tell if a scammer has your email<\/h2><p class=\"nord-text text-base leading-normal text-black\">If you trust your observational skills, there are key signs you should watch for that could indicate a scammer has gained access to your email address. These signs often include:<\/p><ol class=\"leading-loose List_list__BljM0 List_ol__Aykkt\"><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>You get many scam emails<\/b><\/p><p class=\"nord-text text-base leading-normal text-black\">Have you noticed an increase in emails asking for your personal information or claiming urgent action is needed? This could indicate that a scammer has your email address and is using <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/what-is-phishing\/\" data-ga-slug=\"Link to \/blog\/what-is-phishing\/\" data-link=\"NordUIlink\">phishing tactics<\/a> to coerce you into exposing sensitive data.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>You receive unexpected 2FA requests<\/b><\/p><p class=\"nord-text text-base leading-normal text-black\">If you get unexpected two-factor authentication requests for services you haven&#8217;t accessed, it could mean someone is trying to gain unauthorized access to your account using your email.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>You have problems logging into your online accounts<\/b><\/p><p class=\"nord-text text-base leading-normal text-black\">Are you experiencing difficulties accessing your online accounts, even with the correct credentials? If so, then it is very likely that someone has used your email to gain access and changed your login information, effectively locking you out of your accounts.<\/p><\/li><li class=\"ListItem_item__ZgGQo list-item mb-2\"><p class=\"nord-text text-base leading-normal text-black\"><b>Your contacts received messages from your email address that you haven\u2019t sent<\/b><\/p><p class=\"nord-text text-base leading-normal text-black\">If your friends or colleagues mention receiving suspicious emails that appear to be from you, it could be that your email account has been compromised. The attacker might be using your account to deceive your contacts into sharing sensitive information that could be used against them.<\/p><\/li><\/ol><p class=\"nord-text text-base leading-normal text-black\">Bear in mind, however, that today\u2019s hackers know how to cover their tracks and operate discreetly to minimize any signs of wrongdoing. This is to say that finding out whether a scammer has exploited your email address can often be ambiguous and may require more than just keeping your eyes peeled.<\/p><p class=\"nord-text text-base leading-normal text-black\">Fortunately, there are digital tools available today that can help you find out if a breach has occurred. Take NordPass\u2019 <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/have-i-been-hacked\/\" data-ga-slug=\"Link to \/have-i-been-hacked\/\" data-link=\"NordUIlink\">Data Breach Scanner<\/a>, for example \u2013 a tool that scans <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/email-found-on-dark-web\/\" data-ga-slug=\"Link to \/blog\/email-found-on-dark-web\">the dark web<\/a> for any mentions of your email address. With this solution, you can quickly check if your email address has been compromised and take the necessary action without having to monitor for signs of unusual behavior on your device.<\/p><p>\u00a0<\/p><h2 id=\"what-scammers-can-do-with-your-email-address\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">What scammers can do with your email address<\/h2><p class=\"nord-text text-base leading-normal text-black\">Although we&#8217;ve touched on this topic in the previous section, it&#8217;s crucial to take a closer look at the potential dangers posed by scammers who want to exploit your email address. First of all, malicious actors may use phishing tactics to trick you into revealing sensitive personal information, or they might distribute malware via deceptive emails in an attempt to compromise your device&#8217;s security.<\/p><p class=\"nord-text text-base leading-normal text-black\">Moreover, if hackers gain unauthorized access to your email account, they can commit <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/blog\/what-is-identity-theft\/\" data-ga-slug=\"Link to \/blog\/what-is-identity-theft\">identity theft<\/a> and financial fraud, as well as take over your online accounts, and access other linked services and sensitive information stored in your email. All these risks highlight the urgent need for you to protect your email address and respond immediately to any signs of data compromise.<\/p><h2 id=\"what-you-can-do-if-a-scammer-has-your-email\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">What you can do if a scammer has your email<\/h2><p class=\"nord-text text-base leading-normal text-black\">Depending on the timing in the &#8220;a scammer got my email&#8221; scenario\u2014whether it\u2019s before or after they\u2019ve used the email address for nefarious purposes\u2014there are different actions you can (and should) take. Let&#8217;s explore both scenarios and discuss steps to protect your data.<\/p><h3 id=\"if-a-scammer-only-has-your-email-address\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">If a scammer only has your email address<\/h3><p class=\"nord-text text-base leading-normal text-black\">At this point, nothing critical has happened yet, but you should stay vigilant, as phishing attempts could arrive at any moment. This means you need to be extra aware that someone might try to use your email to gain access to your digital belongings.<\/p><p class=\"nord-text text-base leading-normal text-black\">To secure your account, first ensure your email password is complex (consisting of letters, numbers, and symbols arranged randomly) and at least 12 characters long to resist brute-force attacks. Consider using a robust password manager like NordPass to generate and store strong passwords for all your accounts\u2014including email\u2014so you can avoid creating weak passwords and stop relying on your memory for storage.<\/p><p class=\"nord-text text-base leading-normal text-black\">Second, enable multi-factor authentication (MFA) on your email account to make it extra difficult for cybercriminals to gain access. Additionally, regularly review your email account activity and set up alerts for unusual login behavior to catch any unauthorized access attempts early.<\/p><h3 id=\"if-a-scammer-has-already-gained-access-to-your-email-account\" class=\"nord-text text-h3 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">If a scammer has already gained access to your email account<\/h3><p class=\"nord-text text-base leading-normal text-black\">Things get really serious when someone gains access to your email account and starts using it to wreak havoc. However, this doesn\u2019t mean you have to stand by and watch a cyberattacker carry out their malicious activities. If your email account has been compromised, you can and should act quickly.<\/p><p class=\"nord-text text-base leading-normal text-black\">Firstly, if you still have access to your account, go to your email settings and change your password immediately. Then, request the platform to log you out of all sessions after the password change to block the hacker&#8217;s access and regain control. Also, if you haven\u2019t already, enable multi-factor authentication (MFA) to prevent similar security incidents in the future.<\/p><p class=\"nord-text text-base leading-normal text-black\">If you cannot access your account because the hacker has changed your login credentials, contact your email provider as soon as possible to report the security breach. Inform them about your situation so that their customer support team can help you restore access, reset your password, and lock out any unauthorized parties.<\/p><p class=\"nord-text text-base leading-normal text-black\">Once you&#8217;re certain that access to your email account is secure again, run antivirus or antimalware tools to thoroughly scan your device for any lingering malicious software that may still pose a threat. Additionally, review your account activity to identify any unauthorized changes made by the attacker while they had access.<\/p><h2 id=\"how-to-protect-your-email-account\" class=\"nord-text text-h2 leading-normal font-medium tracking-tight text-black font-bold\" style=\"line-height: 1.2;\">How to protect your email account<\/h2><p class=\"nord-text text-base leading-normal text-black\">Whether you must react to an unauthorized account takeover or aim to prevent such incidents altogether, you have several options to safeguard your email account. We&#8217;ve already discussed some: using a data breach scanner to monitor if your email address has been compromised, strengthening passwords against brute force attacks, and enabling multi-factor authentication so that a password alone isn&#8217;t sufficient for access.<\/p><p class=\"nord-text text-base leading-normal text-black\">Another option we touched on earlier, but will expand on now, is using a password manager like <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/password-manager\/\" data-ga-slug=\"Link to \/password-manager\/\" data-link=\"NordUIlink\">NordPass<\/a> to protect your email account. With NordPass, you can generate highly secure passwords for your email and all your other accounts, and store them all in an encrypted vault accessible only to you. You can also use NordPass as an authenticator app to provide two-factor authentication codes for enhanced security.<\/p><p class=\"nord-text text-base leading-normal text-black\">Additionally, NordPass comes with two major features that can help you significantly enhance your email account\u2019s security. The first is the Data Breach Scanner feature, which, as you already know, scans the dark web to check if your email has been compromised. The other feature is <a class=\"nord-link cursor-pointer outline-none transition-colors duration-250 ease-out text-teal hover:text-teal-dark\" href=\"\/en\/email-masking\/\" data-ga-slug=\"Link to \/email-masking\">Email Masking<\/a>, which lets you create an artificial email address when you sign up for newsletters or online services, ensuring that you can avoid exposing your real email address if you choose not to.<\/p><p class=\"nord-text text-base leading-normal text-black\">NordPass offers all these features to help you elevate the security of your email account and more. Given its value, it would be a missed opportunity not to try it out in its 14-day trial, wouldn&#8217;t it? The choice is yours.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"63567\" class=\"elementor elementor-63567\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45e3ec76 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"45e3ec76\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-311e216d\" data-id=\"311e216d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d9a2e6f elementor-widget elementor-widget-text-editor\" data-id=\"3d9a2e6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About NordPass<br \/><\/strong>NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.<\/p><p>The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-51a2bcf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"51a2bcf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c73a037\" data-id=\"c73a037\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-821bef5 elementor-widget elementor-widget-spacer\" data-id=\"821bef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Can you tell who has your email address? Initially just [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1129,1273,973,61],"tags":[974,1131,1272],"class_list":["post-80058","post","type-post","status-publish","format-standard","hentry","category-nordpass","category-1273","category-nord-security","category-press-release","tag-nord-security","tag-nordpass","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What to do if a scammer has your email address - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordpass.com\/blog\/what-to-do-if-a-scammer-has-your-email-address\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to do if a scammer has your email address - Version 2\" \/>\n<meta property=\"og:description\" content=\"Can you tell who has your email address? Initially just [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordpass.com\/blog\/what-to-do-if-a-scammer-has-your-email-address\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-20T12:15:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/a.storyblok.com\/f\/157611\/1200x627\/c9399fef02\/scammer-has-email.png\/m\/1080x0\/filters:quality(75)\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-to-do-if-a-scammer-has-your-email-address\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/07\\\/what-to-do-if-a-scammer-has-your-email-address\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"What to do if a scammer has your email address\",\"datePublished\":\"2024-07-20T12:15:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/07\\\/what-to-do-if-a-scammer-has-your-email-address\\\/\"},\"wordCount\":1342,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-to-do-if-a-scammer-has-your-email-address\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1200x627\\\/c9399fef02\\\/scammer-has-email.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"keywords\":[\"Nord Security\",\"NordPass\",\"2024\"],\"articleSection\":[\"NordPass\",\"2024\",\"Nord Security\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/07\\\/what-to-do-if-a-scammer-has-your-email-address\\\/\",\"url\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-to-do-if-a-scammer-has-your-email-address\\\/\",\"name\":\"What to do if a scammer has your email address - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-to-do-if-a-scammer-has-your-email-address\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-to-do-if-a-scammer-has-your-email-address\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1200x627\\\/c9399fef02\\\/scammer-has-email.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"datePublished\":\"2024-07-20T12:15:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-to-do-if-a-scammer-has-your-email-address\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-to-do-if-a-scammer-has-your-email-address\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-to-do-if-a-scammer-has-your-email-address\\\/#primaryimage\",\"url\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1200x627\\\/c9399fef02\\\/scammer-has-email.png\\\/m\\\/1080x0\\\/filters:quality(75)\",\"contentUrl\":\"https:\\\/\\\/a.storyblok.com\\\/f\\\/157611\\\/1200x627\\\/c9399fef02\\\/scammer-has-email.png\\\/m\\\/1080x0\\\/filters:quality(75)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nordpass.com\\\/blog\\\/what-to-do-if-a-scammer-has-your-email-address\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to do if a scammer has your email address\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What to do if a scammer has your email address - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordpass.com\/blog\/what-to-do-if-a-scammer-has-your-email-address\/","og_locale":"en_US","og_type":"article","og_title":"What to do if a scammer has your email address - Version 2","og_description":"Can you tell who has your email address? Initially just [&hellip;]","og_url":"https:\/\/nordpass.com\/blog\/what-to-do-if-a-scammer-has-your-email-address\/","og_site_name":"Version 2","article_published_time":"2024-07-20T12:15:08+00:00","og_image":[{"url":"https:\/\/a.storyblok.com\/f\/157611\/1200x627\/c9399fef02\/scammer-has-email.png\/m\/1080x0\/filters:quality(75)","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordpass.com\/blog\/what-to-do-if-a-scammer-has-your-email-address\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/07\/what-to-do-if-a-scammer-has-your-email-address\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"What to do if a scammer has your email address","datePublished":"2024-07-20T12:15:08+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/07\/what-to-do-if-a-scammer-has-your-email-address\/"},"wordCount":1342,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/nordpass.com\/blog\/what-to-do-if-a-scammer-has-your-email-address\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/1200x627\/c9399fef02\/scammer-has-email.png\/m\/1080x0\/filters:quality(75)","keywords":["Nord Security","NordPass","2024"],"articleSection":["NordPass","2024","Nord Security","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/07\/what-to-do-if-a-scammer-has-your-email-address\/","url":"https:\/\/nordpass.com\/blog\/what-to-do-if-a-scammer-has-your-email-address\/","name":"What to do if a scammer has your email address - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordpass.com\/blog\/what-to-do-if-a-scammer-has-your-email-address\/#primaryimage"},"image":{"@id":"https:\/\/nordpass.com\/blog\/what-to-do-if-a-scammer-has-your-email-address\/#primaryimage"},"thumbnailUrl":"https:\/\/a.storyblok.com\/f\/157611\/1200x627\/c9399fef02\/scammer-has-email.png\/m\/1080x0\/filters:quality(75)","datePublished":"2024-07-20T12:15:08+00:00","breadcrumb":{"@id":"https:\/\/nordpass.com\/blog\/what-to-do-if-a-scammer-has-your-email-address\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordpass.com\/blog\/what-to-do-if-a-scammer-has-your-email-address\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nordpass.com\/blog\/what-to-do-if-a-scammer-has-your-email-address\/#primaryimage","url":"https:\/\/a.storyblok.com\/f\/157611\/1200x627\/c9399fef02\/scammer-has-email.png\/m\/1080x0\/filters:quality(75)","contentUrl":"https:\/\/a.storyblok.com\/f\/157611\/1200x627\/c9399fef02\/scammer-has-email.png\/m\/1080x0\/filters:quality(75)"},{"@type":"BreadcrumbList","@id":"https:\/\/nordpass.com\/blog\/what-to-do-if-a-scammer-has-your-email-address\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"What to do if a scammer has your email address"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-kPg","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/80058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=80058"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/80058\/revisions"}],"predecessor-version":[{"id":80062,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/80058\/revisions\/80062"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=80058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=80058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=80058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}