Monday, June 9, 2014
On 12:34 AM by Unknown No comments
These tricks are some of the more preferred choices of hackers around the world to hack into a Facebook account!
Social networking giant Facebook is indeed a giant of sorts in the recent times. With more and more people using the platform to connect with their near and dear ones, the chances of being hacked have also gone haywire. Hackers could make use of either of the following tricks to get through your account for their vested interests. Beware!
1.Phishing
Phishing is the attempt to sabotage sensitive information such as usernames, passwords, and credit card details by posing as a trustworthy entity in an electronic communication. These entities normally range from popular social web sites, auction sites, banks, online payment processors to IT administrators. Phishing is normally carried out by means of email spoofing/instant messaging (emails used in the process usually carry links to websites that have been infected with malware.). These spoofed emails/messages usually direct the users to a separate however extremely genuine looking website where they might be asked to re-enter their account information. These genuine-looking websites are in fact fake/scams in disguise and lure users into submitting their sensitive information. Once through, users' account gets hacked!
2.Keyloggers/RATs
Keyloggers are essentially a surveillance tool often used by employers to ensure employees use work computers for business purposes only. However, with time hackers have come to make good use of the tool for their own vested interests. The process of keylogging becomes particularly effective if the miscreant somehow gains physical access to the victim's computer. All that a hacker needs to do now is to install a keylogger into the victims's computer and direct the same to his/her destination. The keylogger will now record all the victim's keystrokes into a log file and send it to the destination chosen by the hacker. The hacker can then use these logs to acquire the victims's account information and hack into it.
3.Primary Email address
This is quite an obvious way for hackers to get through your Facebook accounts. If a hacker is able to somehow hack into your primary email address what you're also using to log into Facebook, well, it's a walk in the park for him/her after that. The hacker can easily use Facebook's 'Forgot password' trick to make the social networking site to send the victim's password to the designate primary email account, that unfortunately has already been compromised.
4.Social Engineering
Social Engineering is the psychological manipulation of people into performing actions or divulging confidential information. This will eventually depend upon the hacker's logical expertise. It could involve a probable guessing of the password based on the victim's Facebook and other social networking profiles.
Social networking giant Facebook is indeed a giant of sorts in the recent times. With more and more people using the platform to connect with their near and dear ones, the chances of being hacked have also gone haywire. Hackers could make use of either of the following tricks to get through your account for their vested interests. Beware!
1.Phishing
Phishing is the attempt to sabotage sensitive information such as usernames, passwords, and credit card details by posing as a trustworthy entity in an electronic communication. These entities normally range from popular social web sites, auction sites, banks, online payment processors to IT administrators. Phishing is normally carried out by means of email spoofing/instant messaging (emails used in the process usually carry links to websites that have been infected with malware.). These spoofed emails/messages usually direct the users to a separate however extremely genuine looking website where they might be asked to re-enter their account information. These genuine-looking websites are in fact fake/scams in disguise and lure users into submitting their sensitive information. Once through, users' account gets hacked!
2.Keyloggers/RATs
Keyloggers are essentially a surveillance tool often used by employers to ensure employees use work computers for business purposes only. However, with time hackers have come to make good use of the tool for their own vested interests. The process of keylogging becomes particularly effective if the miscreant somehow gains physical access to the victim's computer. All that a hacker needs to do now is to install a keylogger into the victims's computer and direct the same to his/her destination. The keylogger will now record all the victim's keystrokes into a log file and send it to the destination chosen by the hacker. The hacker can then use these logs to acquire the victims's account information and hack into it.
3.Primary Email address
This is quite an obvious way for hackers to get through your Facebook accounts. If a hacker is able to somehow hack into your primary email address what you're also using to log into Facebook, well, it's a walk in the park for him/her after that. The hacker can easily use Facebook's 'Forgot password' trick to make the social networking site to send the victim's password to the designate primary email account, that unfortunately has already been compromised.
4.Social Engineering
Social Engineering is the psychological manipulation of people into performing actions or divulging confidential information. This will eventually depend upon the hacker's logical expertise. It could involve a probable guessing of the password based on the victim's Facebook and other social networking profiles.
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
The importance of encryption tools lies in one simple fact. Prevention is better than cure. File encryption is of paramount importance...
-
This is the age of connectivity. We randomly switch from smartphone to tablet to computer many times every single day, so much so that some...
-
Looking for a free ebooks on some topic? Your search ends here with these websites.. When looking for free ebooks, there are many reso...
-
Hi friends some of the viewers had messaged me to give hacking books so that they can learn every thing offline.So here i am providing with...
-
The following keyloggers are handy tools for hacking/surveillance. Keylogger is basically a surveillance software that has the capabi...
-
Carrying around an actual computer is now possible since we have USB sticks that you can use to store all the basic utilities you need and ...
-
Hacking tools are available aplenty. Top hackers in the world today recommend hacking tools made for Linux and Windows operating systems. I...
-
Did you know you could use HTML to hack a website? Here's how to do it! Yes folks, you can use HTML to hack a website....
-
While a great deal of time and effort is invested in designing and developing a software, it only takes a few seconds to bring it down on...
-
Whether it is the iPhone, iPad or Android-based systems, building an app quickly is an imperative for developers. Developers often ...
Copy Rights 2014 Himanshu_Teotia. Powered by Blogger.
0 comments:
Post a Comment