Methods used for Facebook hacking and how to protect against it

Facebook is the most used social networking website used by millions of people daily. This is the reason why everyone wants to get in this website and hack it. The most asked question on our website and facebook fan page is “How can I hack a Facebook account?”. There are only few methods which someone can use to hack their friend’s Facebook account. Today I will discuss all those methods. And also will give a few tips on how to protect your facebook account from being hacked.

Phishing Attach

Phishing attack is the most common method of Facebook hacking. In this attack, you are sent to a website which is a copy of Facebook. When you type your email id and password in the fields, those credentials are saved in a separate text file without giving any information to the Victim.

Protection:- Whenever you open facebook, may sure to see the URL bar. It should be https://www.facebook.com and not fakeweb.com or something else.

Keylogging

Keylogging is the easiest way Facebook accounts are hacked. Even a person with good computer knowledge can fail to notice keylogging. The keylogger installs itself silently in the victim’s computer while another software is being installed.

Protection:- Always install software from verified publishers and well reputed websites and never install useless software like, “facebook hacker tool” or something like that. You will never be able to hack someone’s account using those software and instead your account will get hacked.

 

USB Hacking

Hacking via a malicious USB can be used to cause all kinds of mayhem. You can get all the passwords the victim saved in their computer and web browser using USB Hacking.

Protection:- Never trust unknown removable devices.

Man-In-The-Middle Attack

If the hacker and the victim are on the same network, then this attack can be performed. The attacker acts as a default gateway between the victim’s computer and the server and gets all the information which the victim is sending to the server. This is possible over HTTPS by establishing two independent SSL sessions, one over each TCP connection.

Related posts

The Future of Mobile Security: Emerging Threats and Countermeasures

From Concept to Launch: Ensuring Cybersecurity in Product Development

What Exactly is Telematics? The Technology That’s Changing How We Drive

4 comments

muhammad amin October 24, 2015 - 1:39 pm
hacked
Alex Shabu October 17, 2015 - 1:35 pm
Brothers if they wanna hack you they will hack you there is nothing you can do about that . The best way not to get hacked is not to piss of any hackers . <3 hackers
Nick June 3, 2015 - 8:47 pm
Would I be protected from a man in the middle attack if I used a VPN?
A normal user June 4, 2015 - 8:50 am
Using a Proxy/VPN will make you more vulnerable to becoming victim to a man in the middle attack. unless! UNLESS! it is a private VPN no one else uses, Public VPN's that hundreds of people use are usually the most vulnerable.

Comments are closed.

Add Comment