Download Article Download Article

If you feel suspicious that your Yahoo Mail has been hacked, you can do some basic investigation to confirm your doubts. Yahoo Mail keeps a record of all your account’s recent activities, including your login information. If you see something wrong, you can drill down further and get the location and IP address, which you can use to find out who hacked your email account.

Part 1
Part 1 of 2:

Checking Your Account History

Download Article
  1. Go to Yahoo Mail. Go to the Yahoo Mail login page and sign in. Log in using your Yahoo ID, or username, and password in the two text boxes provided. Click Sign In to proceed to your mail account.
  2. Click the gear button on the top right corner of your Yahoo Mail to bring down the Settings menu. Click the “Account Info” link from here. You will be brought to your Yahoo account data.
    Advertisement
  3. Click the “Recent Activity” menu from the left panel. All the recent activities made by your Yahoo account will be displayed. Most items here will involve your login or session records, since Yahoo keeps track of these.
  4. Look at all the activities listed on the Recent Activity menu and see if there’s anything out of the ordinary. Check and verify if you are the one who made all these. Yahoo keeps a record of your sign-in history for the past 30 days.
  5. If you see something suspicious—for example a sign in from a device or a location you didn’t know of—click the record for the activity. A small window will appear displaying the sign-in history under the device for the location for the last 30 days.
  6. The IP address for every sign in is recorded with each entry. You can then use this to track your hacker, since IP addresses are unique. You may need to work with your local Internet service provider and/or law enforcement agency to track down the IP address’ exact location and your hacker.
    • It is very unlikely that you will be able to track down the individual who hacked your account via the IP address. The chances are good that a person wasn’t even involved, and that your account was compromised by an automated hacking program. The best thing you can do is change your password to prevent future hacks.
  7. Advertisement
Part 2
Part 2 of 2:

Preventing Future Attacks

Download Article
  1. Change your password. If you’ve confirmed that someone else has access to your Yahoo account, immediately change your password to stop it. Click the “Change your password” link at the top of the page to quickly start the process. You will be brought to the password change page. Enter your new password and save it.
  2. You can have a recovery account associated with your Yahoo account. Make sure that this account is secured as well, and that it is an account you control. You can change this from the “Account security” section of the Yahoo Mail Settings.
  3. 3
    Turn on two-step verification. This is an additional layer of security. Yahoo will send you a text message whenever you log into your account. You’ll need to enter the code you receive in order to access the account. This will prevent unauthorized users from accessing your account information.
  4. Advertisement


Community Q&A

Search
Add New Question
  • Question
    Sometimes my current session is shown as being at a location over 30 minutes away from where I am, while past sessions correctly reflect my location. Is this a sign I'm being hacked?
    Community Answer
    Community Answer
    Mine never shows the exact town I'm in; instead, it registers different nearby towns in my state. The sign in time is always right. The change of address might be due to your internet provider using proxy addresses.
  • Question
    Why does Yahoo show that my account was active somewhere I've not been?
    Community Answer
    Community Answer
    It's possible that someone in that location logged into your account without authorization.
  • Question
    What is an IP address?
    Community Answer
    Community Answer
    An IP address is a unique string of numbers separated by periods identfying each computer using the Internet Protocol to communicate over a network.
See more answers
Ask a Question
200 characters left
Include your email address to get a message when this question is answered.
Submit
Advertisement

Tips

Submit a Tip
All tip submissions are carefully reviewed before being published
Thanks for submitting a tip for review!

You Might Also Like

Disable CookiesHow to Block Cookies in Chrome, Safari, & More
Access Blocked WebsitesAccess Blocked Websites
Clear Your Browser's CookiesClear Your Browser's Cookies
Block Porn on Android4 Ways to Block Porn on Android from Websites and Apps
View Cookies4 Simple Ways to View Cookies in a Web Browser
Hack a ComputerHack a Computer
Install an SSL CertificateHow to Install an SSL Certificate on a Server
Block a Program with Windows FirewallBlock a Program with Windows Firewall
Password Protect a Web PagePassword Protect a Web Page
Open Incognito Mode by Default in Google Chrome (Windows)Open Incognito Mode by Default in Google Chrome (Windows)
Verify a PGP SignatureVerify a PGP Signature
Delete Tracking CookiesDelete Tracking Cookies
Surf the Web Anonymously with ProxiesSurf the Web Anonymously with Proxies
Delete Ring AccountHow to Delete a Ring Account & Cancel Ring Protect
Advertisement

About This Article

Luigi Oppido
Co-authored by:
Computer & Tech Specialist
This article was co-authored by Luigi Oppido. Luigi Oppido is the Owner and Operator of Pleasure Point Computers in Santa Cruz, California. Luigi has over 25 years of experience in general computer repair, data recovery, virus removal, and upgrades. He is also the host of the Computer Man Show! broadcasted on KSQD covering central California for over two years. This article has been viewed 202,310 times.
How helpful is this?
Co-authors: 6
Updated: February 10, 2024
Views: 202,310
Thanks to all authors for creating a page that has been read 202,310 times.

Reader Success Stories

  • Alebachew Yessuf

    Alebachew Yessuf

    Aug 5, 2016

    "It gave me much information."
Share your story

Is this article up to date?

Advertisement