Your digital safety is our top priority. At iTellyou, we understand that navigating the complexities of cybersecurity can be overwhelming. That’s why we’ve crafted this comprehensive FAQ to provide you with clear, actionable answers to all your questions about using our app and staying protected online.
We’re here to help you make the most of iTellyou, ensuring that you’re always a step ahead of cyber threats. Explore, learn, and take control of your online safety! If you don’t find the answers you’re looking for, feel free to reach out to our support team for further assistance.
Data Leaks
What is the purpose of the “Latest Leaks” feature?
This section provides an overview of all your detected data leaks. It categorizes leaks into two tabs:
Resolveds: Leaks you’ve already addressed or resolved.
Pendings: Leaks that require your attention or action.
What does “Not Verified” and “Verified” mean in the SMS section?
This explains common causes of data leaks, such as weak passwords, poor system security, or phishing attacks. By understanding these, you can adapt your behavior to prevent future exposures.
What do the severity labels (Minimal, Moderate, Severe) mean in this section?
- Minimal: Indicates low-risk data exposure, such as a username or non-sensitive data. Action may not be necessary but awareness is important.
- Moderate: Reflects medium risk, such as partial personal details or data that may be used in combination with other leaked data for exploitation. Users should consider strengthening security measures for moderate risks.
- Severe: Highlights high-risk leaks, such as exposed passwords or sensitive information. Immediate action is necessary to protect your accounts and personal data.
What is the purpose of the “What Should I Do?” section?
This is your step-by-step guide to minimize the impact of data leaks, especially those marked as “Severe.” It explains the risks, provides actionable instructions, and educates you on how leaks occur to prevent future incidents.
How can I view details about a specific leak?
Tap on the leak entry to access detailed information about the affected data types, severity, and suggested actions to mitigate the risks.
How can I understand the risks of leaked data?
Tap on “How the leakage of this data can harm you?” in the “What Should I Do?” section. This provides insights into how attackers exploit different types of leaked data.
What should I learn from the “Understand how leaks occur” section?
This explains common causes of data leaks, such as weak passwords, poor system security, or phishing attacks. By understanding these, you can adapt your behavior to prevent future exposures.
SMS Analysis
What is the SMS Analysis feature?
This section helps identify and flag potentially harmful messages, such as phishing scams or fake links, to protect you from fraud.
What happens when I analyze a message?
The app will scan the SMS for suspicious links, language, or patterns and provide a verdict:
- “Danger” state indicates that the uploaded message contains highly malicious content.
- “All Good”: The message is safe.
- “Suspicious”: Follow the app’s recommendations to verify or avoid the message.
How do I check if a message is safe?
Tap on “Check Now” next to the SMS. The app will analyze the message and provide a verdict, such as “All Good” or suspicious.
Can I upload an SMS for manual review?
Yes, tap “Upload Message” to submit the SMS for further analysis if the app cannot process it automatically.
What happens after an SMS is analyzed?
After analysis, the app provides button called “details” that leads you to a summary, indicating why the SMS is safe, suspicious or danger. It also offers recommendations for next steps.
Can I contest the results of an analysis?
Yes, if you disagree with the result, use the “Contest Result” option to provide feedback and request a review.
Security Score
What is the purpose of the Security Score?
The Security Score measures how effectively you are protecting your online accounts and data. By answering questions about your security habits and practices, the app calculates a score that reflects your overall cybersecurity posture. This score takes into account your responses and other security factors.
How does the Security Score help me?
The score provides a clear and actionable snapshot of your current security level. It helps you:
- Track your progress as you adopt better cybersecurity measures.
- Identify weak areas in your security practices.
- Understand the steps needed to improve your protection.
What happens if I cannot complete the questionnaire at once?
You can leave the questionnaire at any point and return later to continue from where you left off. This ensures you can complete it at your convenience without losing any progress.
How is the Security Score calculated?
- The score is based on your responses to questions about security behaviors, such as:
- Whether you use two-factor authentication.
- The strength and uniqueness of your passwords.
- How you handle suspicious messages or data leaks.
- Each response is weighted, and the final score reflects how well you are safeguarding your digital presence.
What can I do after receiving my Security Score?
Once you receive your score, you can:
- Review personalized recommendations to improve weak areas.
- Retake the questionnaire after implementing changes to see your progress.
- Share your score with friends and family to encourage them to enhance their cybersecurity practices.
iTellyou Academy
What is iTellyou Academy?
The iTellyou Academy is your comprehensive cybersecurity resource hub. It provides step-by-step guides, educational articles, and practical advice to help you better understand and protect against digital threats.
Why is the iTellyou Academy important?
In today’s digital landscape, scams and security breaches are increasingly sophisticated. The Academy offers meticulous insights into how threats work, what makes you vulnerable, and how to take effective precautions. By understanding the mechanics of cyber threats, you can stay one step ahead of attackers and avoid becoming a victim.
How does the Academy help prevent scams?
By providing detailed examples of real-world threats and scams, the Academy educates users on what to look out for. For instance:
- Spotting fraudulent links in emails or SMS messages.
- Understanding how attackers use leaked data to impersonate you.
- Avoiding common traps like too-good-to-be-true offers or fake payment requests.
Why is it crucial to understand digital threats in detail?
Cyber attackers often rely on gaps in knowledge to exploit victims. The more you know about threats—like how phishing attacks mimic legitimate communication or how malware can infiltrate your device—the better prepared you’ll be to spot and avoid them.
How does the Academy ensure actionable knowledge?
The content in the Academy is designed to be practical and actionable. Every guide and article includes clear steps to mitigate risks, allowing you to implement effective security measures right away.
Leak News
What is Leak News?
Leak News is such a “passive monitoring” feature that keeps you informed about cybersecurity events, such as company breaches or large-scale data leaks. Unlike active monitoring, which scans for your personal data in leaks, passive monitoring alerts you to potential risks based on publicly available breach announcements.
How is Leak News different from active monitoring?
- Active Monitoring: Focuses on detecting whether your personal information (e.g., email, password, or username) has been directly exposed in a data leak.
- Passive Monitoring: Alerts you to breach announcements involving companies or platforms you may interact with. It helps you stay proactive even if your specific data hasn’t been confirmed as compromised yet.
Why is Leak News important?
When a company experiences a breach, criminals often begin sharing stolen data before public announcements are made. Leak News helps you:
- React quickly if you have an account with the affected company.
- Take preemptive actions, such as changing passwords, enabling MFA (Multi-Factor Authentication), or monitoring your accounts for suspicious activity.
Early awareness gives you a crucial advantage in protecting yourself against potential fraud or scams.
Can I customize the news I receive in Leak News?
Yes, you can select the digital segments or industries you want to follow. For example:
- Games
- Government
- Financial Institutions
- Social Media
- E-commerce
- Healthcare
- And many others
By choosing your interests, Leak News provides curated updates tailored to your digital footprint.
What actions can I take with Leak News?
The feature offers flexible options to stay informed:
- Recommended for You: Get curated news based on your selected interests.
- Read Later: Bookmark news articles for future reading.
- Filter News: Tailor your feed by selecting “More news like this” or “Less news like this.”
- Adjust Preferences: Remove specific sources or topics from your feed.
- Share News: Spread awareness by sharing critical news with friends and family.
How does Leak News enhance my security?
By combining passive monitoring with active monitoring, Leak News equips you with a dual-layered defense:
- Active monitoring identifies breaches where your data is directly involved.
- Passive monitoring provides situational awareness about emerging threats, enabling you to respond to potential risks before they impact you.
This integration ensures you remain informed and ready to act against digital threats.
What should I do if a company I use appears in Leak News?
- Check Your Accounts: Ensure your login credentials are secure.
- Change Passwords: Update them immediately if you suspect they may be compromised.
- Enable MFA: Add an extra layer of security to your accounts.
- Monitor for Suspicious Activity: Keep an eye on financial transactions and login attempts.
- Use the App’s Feature Active Monitoring: Confirm if your personal data is part of the breach.