SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
Your Page Hacked 
7 Tips to help prevent your Facebook from being Hacked!
HACKING HURTS, ESPECIALLY WHEN YOUR 
FAN PAGE ITSELF IS HACKED. 
It’s easier to hack into an admins account, than it is 
the actual Facebook Fan page. Once you’ve hacked 
into an admins account, you get access to the 
Facebook Fan Pages he or she admins!
How your account can be hacked? 
There are many different ways your Facebook account can be “Hacked”. The most 
malicious and damaging form of hacking occurs through phishing, or when a hacker 
gains unauthorised access to an account after the user has clicked through to a fake 
app or link. Once the user has clicked through to the link or app the user will be 
redirected to a page that looks almost identical to that of Facebook’s login screen. If the 
user then enters in their username and password without identifying the page as a fake, 
the hacker will then have complete access to their account. The hacker is now able to 
utilise the users account to spread the infection further via their newly acquired friends.
1If it looks suspicious, it’s probably is 
If you don’t like the look of a post, link or App, do not click on in it. Obvious right? Yet people 
continue to fall into the trap. Most malicious links or Apps will offer you something too good to be 
true or use statements like “Shocking”, “Embarrassing”, “Unbelievable” or “Check This Out” in an 
attempt to draw users in to clicking through. If you are in any doubt as to the nature of any posts 
from a “Friend” do not click on it, there is no point risking being hacked for a cheap thrill.
2Don’t be a Friend whore 
It‘s in our nature to want to make friends, but it’s also in our nature to want to compete with others 
and to have more Facebook friends than what our real life friends have. 
Hackers, understanding that it’s in our nature and take advantage of a Facebook user’s eagerness 
to grow their Facebook friends list by sending out a countless number of fake friend requests. 
They hope to fool the user into accepting at least three of these fake requests. 
Why three you ask? Facebook has measures in place to allow users who lose or forget their 
Password and secret answer to recover there account with the help of three of their “trusted 
friends”. 
To gain access to your account, all a hacker needs to do is pretend that they are you and that they 
have forgotten your account password and secret answer. Once they have been directed to the 
Facebook password recovery page they are able to, with the help of the three fake friends you 
have previously approved, reset your accounts password. After a 24 hour freeze out period 
following the password reset, the hacker is able to have full access to your account. 
This method of hacking is especially concerning to businesses that may be operating a Facebook 
account for marketing purposes, as they are more likely to blindly accept Facebook Friend 
requests in an attempt to increase their reach. This is one reason why businesses should only set-up 
Facebook fan pages and not personal profiles to promote a business.
3“Password” is not an acceptable Password 
Having a strong password will not prevent your Facebook from being hacked if you have fallen 
victim to one of the many phishing swindles hackers attempt. It will however make it incredibly 
difficult for hackers to gain direct access to your account through less extensive and more 
primitive hacking techniques. The most primitive technique is simply making a calculated guess 
of a person password. The users; name, their wife, boyfriend, sibling, pet, birthday or the word 
password are examples of passwords hackers expect people to use, due to their easy to 
remember nature.
4Always check the URL 
The aim of phishing is to get the user to unknowingly share their Facebook login details with the 
hacker. The most common way hackers achieve this is, is by tricking the user into entering their 
Facebook details into a fake Facebook login page 
A clear indication of a fake login page is found within the URL of the 
page. Although hackers can make exact copies of the actual login 
page, they are unable to use the same URL.
5Don’t grant permission to unknown or 
suspicious Applications 
One of the most popular features within Facebook is Applications. To be able to use, or access 
most applications you are required to grant access to the application to use some of your 
personal information and to promote the group via your wall. Most applications that ask for access 
are trustworthy and genuinely need access to your information, but there are some Apps out there 
that are designed specifically to exploit the access you give them.
6Beware the “Smart Phone” 
It is becoming increasingly more popular for Facebook users to access their accounts via their 
mobile phones, with many mobile phone service providers even offering free access to Facebook 
as part of their service. Although smart phones and free access makes it easier for users to check 
their Facebook accounts it may also be making it easier for hackers to hack their accounts.
7Enable Secure Browsing 
Final tip, Facebook now allows its users to put their Facebook Profile in a type of safe mode. 
Putting your Facebook in to this safe mode means that the information that is transferred between 
you and Facebook is now encrypted, meaning hackers are unable to easily intercept the 
information being sent and received.
PROTECT YOUR ACCOUNT BY CLICKING THIS LINK 
https://www.facebook.com/hacked 
If you think your account was taken over by someone else, Facebook can 
help you secure it with the above link. This process can also help if your 
account or computer has been affected by a virus or malware. 
KISHORE KANKIPATI 
UX Designer, Digital Marketing Consultant

Más contenido relacionado

La actualidad más candente

Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
Ernest Staats
 
Using Social Media in the Restaurant Industry
Using Social Media in the Restaurant IndustryUsing Social Media in the Restaurant Industry
Using Social Media in the Restaurant Industry
Kyle Lacy
 

La actualidad más candente (19)

Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
 
10.a guide-to-facebook-security
10.a guide-to-facebook-security10.a guide-to-facebook-security
10.a guide-to-facebook-security
 
hire a hacker
hire a hackerhire a hacker
hire a hacker
 
How to use a Tool to Hack Facebook?
How to use a Tool to Hack Facebook?How to use a Tool to Hack Facebook?
How to use a Tool to Hack Facebook?
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]
 
Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15
 
HOW CAN I VIEW PRIVATE INSTAGRAM PROFILES IN 2021?
HOW CAN I VIEW PRIVATE INSTAGRAM PROFILES IN 2021?HOW CAN I VIEW PRIVATE INSTAGRAM PROFILES IN 2021?
HOW CAN I VIEW PRIVATE INSTAGRAM PROFILES IN 2021?
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 
pirater un compte fb
pirater un compte fb
pirater un compte fb
pirater un compte fb
 
CAN I VIEW PRIVATE INSTAGRAM PROFILES 2021?
CAN I VIEW PRIVATE INSTAGRAM PROFILES 2021?CAN I VIEW PRIVATE INSTAGRAM PROFILES 2021?
CAN I VIEW PRIVATE INSTAGRAM PROFILES 2021?
 
Are you missing out on these 22 social media linking opportunities matthew ...
Are you missing out on these 22 social media linking opportunities   matthew ...Are you missing out on these 22 social media linking opportunities   matthew ...
Are you missing out on these 22 social media linking opportunities matthew ...
 
7 Ways To Attract Twitter Followers
7 Ways To Attract Twitter Followers 7 Ways To Attract Twitter Followers
7 Ways To Attract Twitter Followers
 
Google plus 10 mar15
Google plus 10 mar15Google plus 10 mar15
Google plus 10 mar15
 
11 Reasons to Backup Your Facebook Page
11 Reasons to Backup Your Facebook Page11 Reasons to Backup Your Facebook Page
11 Reasons to Backup Your Facebook Page
 
Facebook
FacebookFacebook
Facebook
 
Using Social Media in the Restaurant Industry
Using Social Media in the Restaurant IndustryUsing Social Media in the Restaurant Industry
Using Social Media in the Restaurant Industry
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Dangers of facebook by sani
Dangers of facebook by saniDangers of facebook by sani
Dangers of facebook by sani
 

Similar a Facebook Hacked, Protect Your Facebook Account

Facebook privacy
Facebook privacyFacebook privacy
Facebook privacy
Julie Xiao
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
amby3
 

Similar a Facebook Hacked, Protect Your Facebook Account (20)

How to avoid facebook scams
How to avoid facebook scamsHow to avoid facebook scams
How to avoid facebook scams
 
hacker un compte facebook
hacker un compte facebook 
hacker un compte facebook
hacker un compte facebook
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Social networking fraud handout june 2011
Social networking fraud handout june 2011Social networking fraud handout june 2011
Social networking fraud handout june 2011
 
Social networking fraud handout june 2011
Social networking fraud handout june 2011Social networking fraud handout june 2011
Social networking fraud handout june 2011
 
Social networking fraud handout june 2011
Social networking fraud handout june 2011Social networking fraud handout june 2011
Social networking fraud handout june 2011
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
security procedures
security procedures
security procedures
security procedures
 
101 facebooktipsposter24x36 copy
101 facebooktipsposter24x36   copy101 facebooktipsposter24x36   copy
101 facebooktipsposter24x36 copy
 
1)danger of facebook
1)danger of facebook1)danger of facebook
1)danger of facebook
 
Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
 
Facebook
FacebookFacebook
Facebook
 
Facebook Password Sniper
Facebook Password SniperFacebook Password Sniper
Facebook Password Sniper
 
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
6 ways to stay safe on Facebook: Managing your privacy to thwart identity theft
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
How to protect your facebook account from hackers
How to protect your facebook account from hackersHow to protect your facebook account from hackers
How to protect your facebook account from hackers
 
Facebook privacy
Facebook privacyFacebook privacy
Facebook privacy
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Facebook Tutorial For Beginner's
Facebook Tutorial For Beginner's Facebook Tutorial For Beginner's
Facebook Tutorial For Beginner's
 

Más de KANKIPATI KISHORE (7)

Visual resume
Visual resumeVisual resume
Visual resume
 
9 Quotes on Digital Technology
9 Quotes on Digital Technology9 Quotes on Digital Technology
9 Quotes on Digital Technology
 
Affordable websites
Affordable websitesAffordable websites
Affordable websites
 
Facebook Key Metrics
Facebook Key MetricsFacebook Key Metrics
Facebook Key Metrics
 
Principles of User Interface Design
Principles of User Interface DesignPrinciples of User Interface Design
Principles of User Interface Design
 
Social Media
Social MediaSocial Media
Social Media
 
Seo
SeoSeo
Seo
 

Último

Mastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to SuccessMastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to Success
Abdulsamad Lukman
 
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
Cara Menggugurkan Kandungan 087776558899
 

Último (20)

The 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptxThe 9th May Incident in Pakistan A Turning Point in History.pptx
The 9th May Incident in Pakistan A Turning Point in History.pptx
 
SALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptxSALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptx
 
The seven principles of persuasion by Dr. Robert Cialdini
The seven principles of persuasion by Dr. Robert CialdiniThe seven principles of persuasion by Dr. Robert Cialdini
The seven principles of persuasion by Dr. Robert Cialdini
 
Personal Brand Exploration Selk_Ingrid_DMBS_PB1_2024-01.pptx
Personal Brand Exploration Selk_Ingrid_DMBS_PB1_2024-01.pptxPersonal Brand Exploration Selk_Ingrid_DMBS_PB1_2024-01.pptx
Personal Brand Exploration Selk_Ingrid_DMBS_PB1_2024-01.pptx
 
Mastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to SuccessMastering Affiliate Marketing: A Comprehensive Guide to Success
Mastering Affiliate Marketing: A Comprehensive Guide to Success
 
The Art of sales from fictional characters.
The Art of sales from fictional characters.The Art of sales from fictional characters.
The Art of sales from fictional characters.
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh Benday
 
SP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdfSP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdf
 
2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.com2024 Social Trends Report V4 from Later.com
2024 Social Trends Report V4 from Later.com
 
Cartona.pptx. Marketing how to present your project very well , discussed a...
Cartona.pptx.   Marketing how to present your project very well , discussed a...Cartona.pptx.   Marketing how to present your project very well , discussed a...
Cartona.pptx. Marketing how to present your project very well , discussed a...
 
How consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesHow consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their lives
 
Aiizennxqc Digital Marketing | SEO & SMM
Aiizennxqc Digital Marketing | SEO & SMMAiizennxqc Digital Marketing | SEO & SMM
Aiizennxqc Digital Marketing | SEO & SMM
 
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
4 TRIK CARA MENGGUGURKAN JANIN ATAU ABORSI KANDUNGAN
 
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency EscortsAligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
 
Alpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptxAlpha Media March 2024 Buyers Guide.pptx
Alpha Media March 2024 Buyers Guide.pptx
 
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptxUnveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
Unveiling the Legacy of the Rosetta stone A Key to Ancient Knowledge.pptx
 
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night ServiceVIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
VIP Call Girls Dongri WhatsApp +91-9833363713, Full Night Service
 
[Expert Panel] New Google Shopping Ads Strategies Uncovered
[Expert Panel] New Google Shopping Ads Strategies Uncovered[Expert Panel] New Google Shopping Ads Strategies Uncovered
[Expert Panel] New Google Shopping Ads Strategies Uncovered
 
personal branding kit for music business
personal branding kit for music businesspersonal branding kit for music business
personal branding kit for music business
 
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdfTAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
 

Facebook Hacked, Protect Your Facebook Account

  • 1. Your Page Hacked 7 Tips to help prevent your Facebook from being Hacked!
  • 2. HACKING HURTS, ESPECIALLY WHEN YOUR FAN PAGE ITSELF IS HACKED. It’s easier to hack into an admins account, than it is the actual Facebook Fan page. Once you’ve hacked into an admins account, you get access to the Facebook Fan Pages he or she admins!
  • 3. How your account can be hacked? There are many different ways your Facebook account can be “Hacked”. The most malicious and damaging form of hacking occurs through phishing, or when a hacker gains unauthorised access to an account after the user has clicked through to a fake app or link. Once the user has clicked through to the link or app the user will be redirected to a page that looks almost identical to that of Facebook’s login screen. If the user then enters in their username and password without identifying the page as a fake, the hacker will then have complete access to their account. The hacker is now able to utilise the users account to spread the infection further via their newly acquired friends.
  • 4. 1If it looks suspicious, it’s probably is If you don’t like the look of a post, link or App, do not click on in it. Obvious right? Yet people continue to fall into the trap. Most malicious links or Apps will offer you something too good to be true or use statements like “Shocking”, “Embarrassing”, “Unbelievable” or “Check This Out” in an attempt to draw users in to clicking through. If you are in any doubt as to the nature of any posts from a “Friend” do not click on it, there is no point risking being hacked for a cheap thrill.
  • 5. 2Don’t be a Friend whore It‘s in our nature to want to make friends, but it’s also in our nature to want to compete with others and to have more Facebook friends than what our real life friends have. Hackers, understanding that it’s in our nature and take advantage of a Facebook user’s eagerness to grow their Facebook friends list by sending out a countless number of fake friend requests. They hope to fool the user into accepting at least three of these fake requests. Why three you ask? Facebook has measures in place to allow users who lose or forget their Password and secret answer to recover there account with the help of three of their “trusted friends”. To gain access to your account, all a hacker needs to do is pretend that they are you and that they have forgotten your account password and secret answer. Once they have been directed to the Facebook password recovery page they are able to, with the help of the three fake friends you have previously approved, reset your accounts password. After a 24 hour freeze out period following the password reset, the hacker is able to have full access to your account. This method of hacking is especially concerning to businesses that may be operating a Facebook account for marketing purposes, as they are more likely to blindly accept Facebook Friend requests in an attempt to increase their reach. This is one reason why businesses should only set-up Facebook fan pages and not personal profiles to promote a business.
  • 6. 3“Password” is not an acceptable Password Having a strong password will not prevent your Facebook from being hacked if you have fallen victim to one of the many phishing swindles hackers attempt. It will however make it incredibly difficult for hackers to gain direct access to your account through less extensive and more primitive hacking techniques. The most primitive technique is simply making a calculated guess of a person password. The users; name, their wife, boyfriend, sibling, pet, birthday or the word password are examples of passwords hackers expect people to use, due to their easy to remember nature.
  • 7. 4Always check the URL The aim of phishing is to get the user to unknowingly share their Facebook login details with the hacker. The most common way hackers achieve this is, is by tricking the user into entering their Facebook details into a fake Facebook login page A clear indication of a fake login page is found within the URL of the page. Although hackers can make exact copies of the actual login page, they are unable to use the same URL.
  • 8. 5Don’t grant permission to unknown or suspicious Applications One of the most popular features within Facebook is Applications. To be able to use, or access most applications you are required to grant access to the application to use some of your personal information and to promote the group via your wall. Most applications that ask for access are trustworthy and genuinely need access to your information, but there are some Apps out there that are designed specifically to exploit the access you give them.
  • 9. 6Beware the “Smart Phone” It is becoming increasingly more popular for Facebook users to access their accounts via their mobile phones, with many mobile phone service providers even offering free access to Facebook as part of their service. Although smart phones and free access makes it easier for users to check their Facebook accounts it may also be making it easier for hackers to hack their accounts.
  • 10. 7Enable Secure Browsing Final tip, Facebook now allows its users to put their Facebook Profile in a type of safe mode. Putting your Facebook in to this safe mode means that the information that is transferred between you and Facebook is now encrypted, meaning hackers are unable to easily intercept the information being sent and received.
  • 11.
  • 12. PROTECT YOUR ACCOUNT BY CLICKING THIS LINK https://www.facebook.com/hacked If you think your account was taken over by someone else, Facebook can help you secure it with the above link. This process can also help if your account or computer has been affected by a virus or malware. KISHORE KANKIPATI UX Designer, Digital Marketing Consultant