Wednesday, March 25, 2015

TIPS TO SECURING UR FACEBOOK ACCOUNT !! IZIT




There are 750 million of users of Facebook in the world and Malaysian surely will be among the highest using it.. CINTA MUKA BUKU :) 

That is why Facebook have always been the number 1 target for Hackers (To make an impact and be known).

I will share 5 Ways Hackers Can HACKKKKK ur FACEBOOK Accounts

1. Facebook Phishing 



Phishing : The most popular attack vector widely used for hacking FACEBOOK Accounts.

How does it works.!! Simple, they create fake login page that looks exactly like the real page. As soon as the victim key in their user name and password. The data will be stored in a text file and the hacker then will use it to get all the information on the credential.

Do bear in mind that Hackers also attach Financial Institution using Phishing technique.


2. Keylogging 

The easiest way to hack any account and Facebook

How does it works.!!

The danger about keylogging is that even a person who is good in IT may also fall for this. Its a program that can be installed on any computers and when a person key in his or her records on it, the program will capture the data and transfer the data through logs to the hckers via FTP or the Hackers email address.

3. Stealers 



Do you know that went you save up and stored password in the browser to access Facebook is actually not safe. But many people does that because it is easier for future. Convenient but dangerous. Stealers are software's specially designed to capture saved password in the victims browser.

4. USB Hacking 
Usb password stealer
How does it works.!!

Students like to play with this. When a student hacker physically access your computer he could simply insert a USB programmed with a function to automatically extract saved passwords in the browser.
5. Man In the Middle Attacks
What on earth does it means :)

How does it work.!!

Practically we are the potential victim of the Man in the Middle Attacks. When they are in the same Local Area Network (Lan) and on a switch based network, practically, a hacker can place himself between you and the server. He could also camouflage himself as a default gateway. By then he could capture all th etraffic in between.

To understand more, you could google ARP Poising the AKA name of Man in the Middle Attack.