Skip to main content

How to secure your social medias

How To Secure Your All Social Media Accounts From Hackers? Social Media is a tool in every single person’s hand to share his/her feeling and idea to the world. But if your social media account will hacked? Then where to go? How to recover that account? And mostly asked Question is How To secure social media accounts Like Facebook, Gmail, Twitter and Instagram from hackers .So in this post i’ll tell you how to secure social media accounts from hackers.So in this article i’ll show you which methods hackers use to hack your accounts.

How Hackers Hack Your Facebook/Gmail/Twitter Accounts.

 

#1. Phishing.

Phishing is a Most common method used for hacking like facebook hacking. mostly readers don’t have a single knowledge about that What Is Phishing?phishing is trick to make a fake login page of any social media site like facebook or gmail or any other. as the hacker send you the fake login page of social sites in your gmail or in anyother site. as you enter your “Email Address” & “Password” and as you click on Login button your login mail and password goes to the hackers mail and your account is Hacked.

#2. Keylogging.

Keylogger is the easiest way to hack a Facebook Profile password. basically Keylogger is a small program Built by hackers to hack someone facebook accounts.Mostly Hackers Make Keylogger and install that keylogger on victims computer.now a question arrises how a keylogger works? As victim use his/her facebook account or else any thing on that keylogged computer ,keylogger get all the saved Passwords,Emails And important information of your computer. And that passwords is send directly to hackers email address.

#3. Session Hijacking.

Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan’s. I have already written a three part series on How session hijacking works? and also a separate post on Facebook session hijacking.Be safe from these attacks.

#4. Botnets.

Botnets are not commonly used for hacking facebook accounts, because of it’s high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.

#5. Faceniff.

Facebook Hacking By Faceniff App In Android Or On PC In bluestack.Faceniff is a app which Disables the victims facebook access page from Secure Socket To Unsecure Socket. But The Problem Is that this Facebook Hacking Technique is works on Same Wi-Fi Network. but if you know this technique in Better Way Then I Promised You That you are going in good direction in become of Facebook Pro. Hacker.

Secure Social Media Accounts from Hackers

#1. Update Passwords Regularly.

Updation of social media passwords helps you to secure your social media accounts from being hacked.change your social networking sites accounts regularly i preferred you to change your social media’s accounts passwords in 1 month. and choose your password smartly, make sure you use all alphabets,numbers and special characters in your passwords, by using all these your password is much stronger and not easy to break by hackers.

#2. Link your account with Verified Mobile No.

linking your social media accounts with mobile no. helps you alot, if you really wana to protect your account then dont forget to link your account with mobile no. It helps you when someone tried to login in your social media accounts without permission, as someone tried to do jailbreaking your social media service sent you message about your login access.

#3. Add Trusted Contacts.

Add trusted contacts helps you to recover your hacked account, as some hack your facebook or gmail accounts then by help of your trusted contacts you are able to recover back, i recommended you to apply trusted contacts on facebook, because as you know everyone finds working facebook hacking tricks like a hunger dog. so be safe.

#4. Use HTTPs Connection.

HTTPs Connection helps you to build a secure connection over internet, make sure check your URL before you use HTTPs, by using this feature a rare chance, that a hacker hack your social media account.

 

#5. Never Save Passwords.

Yes, this is quite interesting in social media hacking. generally, many of you going to use your social media accounts in cyber cafes or your friends laptop. but you forgot when you enter your email & password while login on your accounts then mostly every browser give a warning or ask you to Do You Want To Save Password or Not. by default browser have a option of Not Saved,but unluckily if you ignore that warning and you save your password in cyber cafe or friends laptop then defiantly, if i was in the position of your friend then i am able to hack that social media account, the question arises why i am doing this? because you people are fool.so i again told you Never ever saved your social media or other accounts password in any annoying PC/laptop.

Comments

Popular posts from this blog

Kali linux android simply amazing

How to Install and run Kali Linux on any Android Smartphone TUTORIAL FOR INSTALLING AND RUNNING KALI LINUX ON ANDROID SMARTPHONES AND TABLETS Kali Linux is one the best love operating system of white hat hackers, security researchers and pentesters. It offers advanced penetration testing tool and its ease of use means that it should be a part of every security professional’s toolbox. Penetration testing involves using a variety of tools and techniques to test the limits of security policies and procedures. Now a days more and more apps are available on Android operating system for smartphones and tablets so it becomes worthwhile to have  it on your smartphone as well. Kali Linux on Android smartphones and tablets allows researchers and pentesters to perform ” security checks” on things like cracking wep Wi-Fi passwords, finding vulnerabilities/bugs or cracking security on websites.  This opens the door to doing this from a mobile device such a...

What is DNS

D NS stands for Domain Name System is used to as the medium to translate domain names to their respective IP addresses when a client initiates a request query. DNS stores the database of all the domain names and their IP addresses which are registered on the network. Most of us are quite familiar with the term DNS or Domain Name System. DNS can be thought of as an attendance register for various websites present over the internet. In the case of DNS, it maintains the database of all the websites Domain Names and their IP (Internet Protocol) addresses that are operational all over the world. Historical Notes The origins of DNS date back to the time of the ARPANET  when there were only a few computers to get an entry in the database. A HOSTS.TXT file was maintained by Stanford Research Institute, which constituted the data of all the machines, and was copied by all the host machines to remain updated. Jon Postel from the Information Sciences Institute requested Pau...

How tor works

 Using the publicly available data, data visualization software firm Uncharted has prepared TorFlow — a map for visualizing how TOR’s data looks as it flows all across the world. It shows TOR network’s node and data movements based on the IP addresses of relays bouncing around the connections of users to avoid spying. TOR is the world’s most widely used tool for anonymity purposes . It has grown into a powerful network that’s spread all over the world. Surprisingly, the TOR project is transparent about the location of the TOR nodes and thousands of machines that power the network. This non-profit organization frequently published an updated list about the bandwidth and location of the computers and data centers spread all across the world. Using the same public data,  TorFlow  maps the TOR network’s nodes and data flow all around the world. This data movement is measured based on the IP addresses and bandwidth of the relay computers bouncing around the...