Skip to main content

How to protect your Facebook account from been hacked!

Protect yourself against Facebook phishing

What is Phishing

Phishing is a type of attack, were the attacker will pretend to be from a trusted site or pretend to be a legitimate site. This attacker achieve phishing by
  • Site cloning ( making an identical website which is hard to identify), although the DNS address(domain name system) or website address will have a slight and almost non-noticeable difference. When user login on the fake-site, the attackers will have his login credentials thus having legitimate access to the his
    account.
  • Sending an Email to asking for username and password or PIN(personal identification number) pretending to be from facebook admin.

Protection measures!

  • When surfing the internet beware of link to a particular site especially if the site contains sensitive information like bank, social network(eg. Facebook) etc. address like“www.facebook.com.profile.jnjknkjjk.io"/loginis not a legitimate address, because thejnjknkjjk.iomakes the address non genuine.
  • Always bear in your mind that, Facebook will never ask for your password through email or other means. The only place they will ask you login credentials(username and password is through their site or apps).
  • Be vigilant, if for example you see an abnormal wall post on FAF(friends and family) wall quickly inform him and make sure you suggest he reset his password and delete the message.
  • When you receive SPAM(stupid pointless annoying messages) from FAF, make sure to advice him to reset his password immediately.
  • Use a security question. This will help you when someone shutdown your account.
  • When using login credentials to log into a particular site be sure the site is legitimate! Because phishers can act as one thus before you realized it you have lost control to your account!
  • Do not use single password on many websites!
  • Use the latest browsers that has anti-phishing. Example Google Chrome, IE 7 upward, Firefox etc.
  • Make sure you create a strong password combination! Weaker passwords are very simple to guess using brute force(this is a method that is used to get password through use of all possible combination). If one create password with letters only, numbers only or numbers and letters this is called a weak password! But if password is created with the combination of capital letters, small letters, numbers and special characters is considered as a strong password! A password like “vsd$%*?&(235” will take a very long time to crack than password like “Salimsalisu”.

    NB: The above solutions are not limited to Facebook alone!

     If you think you are been hacked report here 

Comments

Popular posts from this blog

Microsoft Office for Tablet now on Google Play store

Back in November, Microsoft opened up early previews builds for its new mobile Office applications for Android tablets to those willing to sign up and wait for an invitation. After taking on feedback over the past couple of months, Microsoft has announced that it is expanding its preview scheme by releasing its Office applications to everyone directly through the Google Play Store. The new Office software for mobile unifies Android, IOS, and Windows platforms. Previously each platform had to make do with its own apps, meaning that feature sets differed depending on your operating system and updates were often slow and intermittent. By unifying the Office platform, Microsoft hopes to bring updates and new features to users in a timelier manner. There are still a couple of conditions attached to the preview builds though. Firstly, Office is still limited to ARM-based Android tablets with a screen size between 7 and 10.1 inches. Your tablet will also need to be running Ki...

Ethical Hacking Simplified. Applications of Cryptography

Pretty good Privacy PGP This type of cryptographic Application uses Public key encryption system and  is one of the most popular means of encryption in the world. It is used in securing data, data storage, email, Instant Messaging (instant messaging are messaging system that happens in real time, just like whatsApp, Facebook messenger etc.) and other forms of communication. The early version of this cryptographic application was written by Philip Zimmerman and has it public appearance in 1991. it is part of an open-source project with many version where user can choose the best that suit them. This cryptographic application comes with privacy and security measure that are found in many online systems. The data will travel in an encrypted form (chipertext), upon arriving at the receiving end, the receiving will use PGP to decrypt the data back to plaintext. PGP uses the Public/Private key encryption. Where the sender uses his public key to encrypt data, and the receiver ...

Tips for strong password

As we have already discussed that passwords are strong and at the same time weak! If user create password from his name, date of birth or any other combination that is related to him, cracking down his account doesn't need much technical know how. Meaning attacker who know you, can be lucky enough to access your sensitive information by only entering certain key combinations. Creating strong and almost non hackable wait!!! is there any non hackable password! I was once told that any system can be hacked! It only took time, skills and resources! You are absolutely right! But at-least one has to really suffer before getting your data! Arm robbers do rob banks! Do you think a local or common thief can rob bank? The ans is absolute NO! Strong passwords doesn't happen by chance! Below are the steps to create a very strong passwords! Passwords should be at-least 8 characters Its already becoming standard on the internet. Many websites doesn't allow less than 6 charact...