☣Facebook : 11 Ways Hackers can Hack Your Account ☣


☣Facebook : 11 Ways Hackers can Hack Your Account ☣

By
Facebook is the most widely used social networking site with more than 1.5 billion users, which makes it a huge target for hackers. In this graphic we will show you the top 11 methods used by hackers to hack Facebook accounts and how you can protect yourself against these cyber crooks.
Hack #1 Phishing
Phishing is still the most common type of assault used for hacking Facebook accounts. There are several strategies for carrying out a phishing attack.
1. Basic Phishing attack works like this...a hacker makes a fake login page which precisely resembles the genuine Facebook page.
2. An email is sent asking the casualty to login into that page.
3. Once the casualty logins through the fake page the casualties "email address" and "secret word" is put away into a content record.
The hacker then downloads the content document and gets his hands of the casualties accreditations.

How To Avoid Phishing Attacks

    Never log into your Facebook account on other devices
    Avoid emails that ask you to log into your Facebook account
    Always use Chrome, as it identifies the phishing page


Hack #2 Keylogging
Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it.
A keylogger is a basically small program which once installed on a victims computer it will record everything which the victim types on his or her computer.
The logs are then sent back to the attacker by either TP or directly to the hackers email address.


Hack #3 Stealers
Almost 80% percent people use stored passwords in their browser to access Facebook. This is very convenient for you, but can be extremely dangerous as stealers can easily access your saved passwords stored in the browsers.


Hack #4 Session Hijacking
Session Hijacking can be often very dangerous if you are accessing Facebook on a . In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account. Session hijacking is widely used on Lans.
How to combat session hijacking
Using a Firefox add-on called Force TLS or if you use Chrome, KB SSL Enforcer. Both will automatically redirect you to secured page of the sites you visit.


Hack #5 Side Jacking / Firesheep
Sidejacking is a popular method for hacking Facebook and email accounts. It's the process of stealing someone's access to a website, typically done on wireless public networks.
Firesheep is a widely used to carry out sidejacking attacks and works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.


 HACK #6 Saved Passwords From Browser
The browser always asks us to save the username and passwords on the computer whenever we log in with any account in our browser. Therefore, anyone can hack your Facebook account from your browser Password Manager.

You can visit this URL and can see username and passwords you saved in your browser:

chrome://settings/passwords

Tips To Protect Yourself

    Never save login credentials on your browser.
    Always use the strong password on your computer.


   HACK #7 Mobile Phone Hacking

Smartphones these days have made it easy for millions of Facebook users to access their accounts through their devices. If the hacker can gain access to the victim’s mobile phone, then he can possibly gain access to his/her Facebook account. While there are several mobile spying softwares used to monitor a mobile phone, the most popular are Spy Phone Gold and Mobile Spy.

Tips To Protect Yourself

    Use a trustworthy mobile security and Antivirus program on your mobile phone
    Never install apps from unknown sources
    Uninstall suspicious apps once you notice



  HACK  #8  Social Engineering

If you are using simple passwords like mobile number, DOB etc., then a good hacker can without any effort guess the password and hack into your account and collect your personal information.

Tips To Protect Yourself

    Never share your personal information via email, phone, chat messenger
    To avoid the risk of Baiting, block USB devices
    Avoid links from suspicious or unknown sites

HACK #9 DNS spoofing

If a hacker is on the same network which is connected to the Victim, he can change the original page and replace it with his own fake page and easily gain access to the victims Facebook account.

How to Avoid DNS Spoofing?

    Always configure it to be secure against cache poisoning
    Manage your DNS servers securely

HACK #10 Man in the middle attacks

In this method, the hacker secretly relays and possibly alters the communication between the server and victim who believe they are directly communicating with each other.

The hacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the hacker.

The Hacker must be able to intercept all relevant messages passing between the two victims and inject new ones. This is straightforward in many circumstances; for example, an attacker within reception range of wireless access point can insert himself as a man-in-the-middle.

How to avoid MIME attacks?

    Use VPN services
    Use a proxy server to access the internet
    Use good antivirus with good firewall options

HACK #11 Botnets

Basically, botnets are networks made of remote-controlled computers or bots. These bots have been infected with malware that allows them to be remotely controlled. It’s expensive to set up botnets and this makes them be minimally used in cases of hacking Facebook accounts. Some very popular botnets include spy eye and Zeus.

How to avoid Botnets

    Keep all your software up to date
    Ensure that your firewall is always on
 

Follow us for More updates.....

Follow Us

Tags:

post facbook hacking phishing Session Hijacking Keylogging

Leave a Message

×
×

This site was designed with Websites.co.in - Website Builder

WhatsApp Google Map

Safety and Abuse Reporting

Thanks for being awesome!

We appreciate you contacting us. Our support will get back in touch with you soon!

Have a great day!

Are you sure you want to report abuse against this website?

Please note that your query will be processed only if we find it relevant. Rest all requests will be ignored. If you need help with the website, please login to your dashboard and connect to support

;