BSI-Test positive: The emergency measures
The most important tips that you as a victim of a botnetHacks should be taken into account, the BSI in the Mail you receive when the BSI safety test you attached (see Screenshot):
- Check your computer with an anti-virus program, the Malware and track down the Botnet may have their Mail spied on. An Overview of good and partly also free anti-virus programs can be found in the CHIP Top-Downloads.
- Change the password of the hacked e-mail Accounts. Like a good password should look, we will explain in the practice tip "What is a secure password"?
- As a precaution, you should also change the passwords of other Accounts - for example, your Facebook-Login, your Amazon or Ebay account, or login data for Online Shops. This is especially true if you use words like in your Mail-use of identical or similar passport account.
- You are awarded for each of these Logins have different and distinctly different passwords. You should change all the important passwords on a regular basis. How, for example, in the case of a GMX Account works, we have here explained.
- Note that a virus scan hit is not necessarily "" and a Botnet-Malware detection - where appropriate, your Account has been compromised in other ways.
- Tip: How do you, for example, the popular anti-virus program Avira correctly install and configure, we will explain in the two linked guides.
- Virus protection tips for the Mac , we have also in a separate article, summarized.
- Your Android phone or Tablet you can also protect against viruses. The best Android virus scanner we have in our major comparison will be determined. One of the three winner of the test, Kaspersky for Android, you can download it here.

BSI-Test positive - the Mail
How to protect long-term against botnet Hacks, or Phishing?
An Overview of basic security measures the BSI here. In addition, please note the following tips:
- If your virus scanner, this function still won't bring it: you set Up Windows Firewall a.
- Avoid, in public networks (to surf the net in the Internet cafe), or unsecured wireless networks on sensitive sites, in which you have to log - in particular, e.g. on Webmail portals.
- To put (at least) a Second e-mail. About your - hopefully well-protected Primary address, you can continue to make important private Mails or Logins to run; the second address you can use to, for example, in the case of forums, newsletters, or other seldom-used Web-log services. This should be spied on, cheated, the Hacker only a relatively unimportant access data.
- Alternatively, you can get for such a "temporary" Logins a disposable Email. Popular provider, you will also find on CHIP-practical tips on how to some Alternatives to the well-known "10 Minute Mail".
- Phishing - that is, the "fishing out" of access to data via fake e-mails - is also a popular Hacker method. Protection tips this practical tip; in front of Twitter as a conduit for Phishing, was also warned.
