Latest
Loading...

24 December 2015

Real Facebook Hacking Revealed by an Ethical Hacker

0 Views


Understand the scenarios, tricks and tools behind Facebook Hacking to protect yourself and your love once

Do you or one of your family members Facebook account got hacked by a hacker? Do you want to know about the science behind Facebook hacking? Or you just want to know how you can protect yourself if your account in under attack or hacked by a hacker then you are at the right place in this article I will not even tell you the science behind Facebook hacking, I will also tell you about what precautions you can take for protecting yourself.

Facebook Hacking

Today, I’m going to explain you the ways of hacking Facebook account but before moving forward I want to tell you that this article is only for education purpose, the only motive behind writing about Facebook hacking in to protect you and let you know about tools and techniques that a hacker used to attack your Facebook accounts.

Ways of Facebook hacking and security tips:

Behind Facebook hacking, there is not a rocket science even 12-year-old teenager can get access to your account using few tools and techniques. So it’s really important to every user to know about what measures, steps they can take for protecting their online presence.
There are eight ways every hacker used to get into your accounts:
  • Phishing: The first, most easy and most popular attack used for hacking online accounts. In this attack, a hacker creates a clone of login web page of a specific website and set it in the way once a user login into it using his own credentials these details can directly save into his database.
Security tip: Always check the URL of the web page where you trying to log in and make a healthy habit of browsing URLs manually I mean typing URLs directly not to used any sources.
  • Keylogging: Keylogging is the technique used by an attacker to get victim’s credentials using a keylogger. Basically, keylogger is a small program that captures every key you typed on your keyboard and send to the attacker by either using FTP or by emails.
Security tip: Always use a good anti key logger to protect yourself from keylogging. There many are anti-key logging programs available in online market.
  • Stealer’s: Usually every user saved their passwords into their browsers for accessibility and ease of use but hackers take advantage of it and they use stealers to steal your browser’s saved passwords, usernames, and even banking transitions details you have saved in your browsers.

Security tip: Stealer’s can be very dangerous and the only way to protect yourself from stealing your data is to use LastPass. It’s a free program that manage your passwords in every efficient way as well it uses 256-bit encryption to save you passwords in your device and that makes stealing impossible.

  • Session hijacking: It was the most dangers attack, but now it’s outdated. In session hijacking the cookies from an insecure connection but now Facebook uses 256-bit encrypted connection that makes the session hijacking very hard.
Security tip: Always make sure that you browse Facebook using secure (https://) connection.
  • Mobile Phone Hacking: Mostly users use Facebook on mobile and hacking a mobile is easier because we don’t take mobile security seriously even few users have a good antivirus on their mobile phones that makes them more vulnerable. A hacker can use spyware and many other mobile hacking techniques to get anything of his use.
Security tip: Always use a good mobile antispyware to protect you precious mobile data and hardcore your mobile security.
  • DNS spoofing: In this technique an attacker changes the original Facebook page to his own fake page if they are on the same network and get the access of victim’s account.
  • USB Hacking: In this technique a hacker program there USB in the way that can extract your credentials from every browser if that USB inserted into a victim’s device.
Security tip: Use a good antivirus program and try to reduce the use of unwanted USB devices unless it’s important and always save your passwords into LastPass.
  • MITM Attack: MITM attack stands for ‘man in middle attack’. It is a network-based attack if a victim and attacker are on the same network then attacker himself place between the client and server then captures all traffic and extract then important information from that sniffed data.
Security tip: You can use a VPN client and a secured tunnel that can encrypt your data from client to server. It will make it impossible to sniff your data using man and middle attack.
That’s it, hope it will be a very useful resource and always think before you click.
Stay safe and stay tuned The Viral Bytes.

மட்டக்களப்பு “ஜிமிக்கி கம்மல்” வீடியோ பாடல்! (Video)

அண்மையில் சமூக வலைதளங்களில் வேகமாக வைரல் ஆகி வரும் ஜிமிக்கி கம்மல் இலங்கையின் பாணியில் மட்டக்களப்பு நூதனன் கலைஞர்களால் படைக்கப்பட்டிருக...