In this blog, I make posts about Hacking,Cool Tricks and Technology Things.

Breaking

Saturday, December 22, 2018

Facebook Hacking Methods And How To Protect From Them.

Common Facebook Hacking Method Used By Hackers & how to protect


Facebook hacking is one of the most viral topic.So thats way i am going to write a article on this and in this post i will tell you the most common method which peoples used for hacking id without any technical knowledge.I hope you will enjoy this post so lets move on topic.

Here is the detail of all widely used methods for facebook hacking.

Hack Facebook Account Password By Phishing


Phishing is still the most popular attack vector used for hacking Facebook accounts. There are various methods to carry out phishing attack. IBut the most common is taht, a hacker creates a  facebook login page (Fake login page) which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim logs in through the fake page the, the victims “Email Address” and “Password” is stored into a text file, and the hacker then downloads the text file and gets his hands on the victim’s credentials.



    How to Protect from these attacks:
     Never Login your Facebook account on other devices.
    Use Google Chrome, it identifies the phishing page.
    Avoid emails that ask you to log in your facebook account.

    Facebook Hacking by Keylogger Method:


    A keylogger is a small software for Windows PC. The keylogger is used to record keystrokes pressed on a keyboard in order to input something to the computer. For example. if you are writing an essay on Microsoft Word and a keylogger is running on your system, the keylogger will record every key you have pressed and therefore will have all the information you have typed.
    What Kind Of Keylogger Need To Hack Facebook:
    The best keyloggers include many functions which can keep the identity of the hacker secure and safe. This include a keylogger which is not easily detected by cheap antivirus softwares, which can self destruct, which can send the keylogged files to hacker in the form of an encrypted email, starts with windows, does not give any error in case of failure, has many settings which you can change remotely and is well hidden from the plain sight. All these functions make a keylogger ideal for hacking purpose.
    How to Protect Against Keylogger:
    •  Install a legit antivirus software.
    • Constantly update your Windows security.
    • Do not install malicious softwares or softwares from untrusted developers.
    • Do not click on harmful links on the internet.
    • Use adblocker on the internet.
    • If you want to find out whether a keylogger is running on your system, you have to have some knowledge of computers and windows. Open the task manager and go to processes tab. Among the list of processes, you have to identify a process, the username of which is same as your username and the image name is something which you are unfamilier with or which has no use running. And when you type something, the CPU usage and CPU time on the image increases.

    Saved Password From Browser:


    As we all know, whenever we log in with an account in your browser, the browser asks you to save the username and passwords in a computer. Anyone can hack your Facebook accounts from your browser password manager. You can visit this URL and can see username and passwords you saved in your browser chrome://settings/passwords.
    How to protect Yourself:
    •  Never save login credentials on your browser.
    • Clear Browser Data regularly.
    • Always use the strong password on your computer.
                                     Thanks For Coming !

                     Facing any problem? Email me at-
                         sudaisabbas74@gmail.com
                  
                                       Peace :-)    

    No comments:

    Post a Comment