Types of Facebook hacking and how to protect

Types of Facebook Hacking and How to Protect

As you, all know that Facebook is the leading social network. It has billions of users. Facebook Hacking is increasing so protect your’s account.
There are many ways one can hack Facebook Account. Today let discuss types of Facebook hacking and how to protect yourself from them.
1.Keylogging:
Keylogging is the easiest way to hack a Facebook password. It sometimes can be so dangerous that even a person with a good knowledge of computers can fail to find it. In this type of attack, a hacker simply sends an infected file having keylogger in it to the victim. If the victim executes that file on his pc, whatever he types will be mailed/uploaded to hacker’s server.
How to Protect:
  • Use a firewall.
  • Execute the file only fro a trusted sender.
  • Use online scanner such as  novirus.org
  • Use good antivirus.
2.Phishing:
Phishing is the most popular attack used for hacking Facebook accounts. It is actually creating fake web pages to steal user’s credentials. Once the victim log in through the fake page then the victims “Email Address” and “Password” will send to hacker’s id.
 How to Protect:
Always check the page URL before logging in. This is the most trusted and effective way one can use to avoid himself from phishing.
These are the trusted URL, which can use to login:
Do not use any URL other than these and stay protected.
3.Sniffing:
Sniffing consists of stealing session in progress. In this type of attack, an attacker makes connection with server and client and pass on message between them, making them believe that they are talking to each other directly.
 How to Protect:
  • Always use SSL secured connections.
4.Session Hijacking:
Session Hijacking can be often very dangerous if you are accessing Facebook on an http (unsecure) connection. In Session Hijacking attack, a hacker steals the victim’s browser cookie, which used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and Wi-Fi connections.
 How to Protect:
  • Always work on SSL secured connections.
5.Sidejacking with Fire ship:
Firesheep is widely used to carry out sidejacking attacks. Firesheep only works when the attacker and victim is on the same Wi-Fi network. A sidejacking attack is another name for http session hijacking, but it targeted towards Wi-Fi users.
 How to Protect:
  • Do not use public Wi-Fi.
  • Use virtual private network

I have an Tech channel if you are interested in tech explanations go now and subscribe

Thanks for visiting....
Follow me on social media:

Comments

Popular posts from this blog

What is the Difference between CPU and GPU

Build your own AI powered voice assistant

History of computers