Top 10 Ways To secure Yourself from Hackers

We will show you the top 10 methods used by hackers to hack your accounts and how you can protect yourself against these cyber crook.



1. ​Phishing

Phishing is still the most common type of assault used for hacking Facebook accounts. There are several strategies for carrying out a phishing attack.

a. Basic Phishing attack works like this..an attacker makes a fake login page which precisely resembles the genuine Web page.

b. An email is sent asking the casualty to login into that page.

c. Once the casualty logins through the fake page the casualties "email address" and "secret word" is put away into a content record.

The hacker then downloads the content document and gets his hands of the casualties accreditations.



2. Keyloggers

Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it.

A keylogger is a basically small program which once installed on a victims computer it will record everything which the victim types on his or her computer.

The logs are then sent back to the attacker directly to the hackers email address.



3. Stealers

Almost 80% percent people use stored passwords in their browser to access Facebook. This is very convenient for you, but can be extremely dangerous as stealers can easily access your saved passwords stored in the browsers.

How to combat Attackers via Stealers

Password managers automatically fill out important forms without you having to type anything in and keeps your passwords safe.

When the "remember password" prompt comes up and you are not at your own computer, click on the "not now" button.



4. Session Hijacking

Session Hijacking can be often very dangerous if you are accessing Social Networking Sites on a http:// connection. In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account. Session hijacking is widely used on Lans.

How to combat session hijacking

Using a Firefox add-on called Force TLS or if you use Chrome, KB SSL Enforcer. Both will automatically redirect you to secured page of the sites you visit.



5. Side Jacking / Firesheep

Sidejacking is a popular method for hacking into accounts. It's the process of stealing someone's access to a website, typically done on wireless public networks.

Firesheep is a widely used to carry out sidejacking attacks and works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.



6. Mobile Phone Hacking

Millions of Facebook through their mobile phones. If the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. There are lots of mobile spying softwares used to monitor a cellphone.

How to Combat Mobile Phone Hacking

1- Confirm your mobile number

Confirming your mobile number is one of many ways to enhance your account security on Social Media. This way, even when you lose or forget your password, Social Media will be able to send you a new one via SMS.

2- Code Generator for Android phones

If you use an android phone, you can set up an extra layer of security by having to enter a code every time you access Social Media through the app.



7. USB Hacking

If an attacker has physical access to your computer, he or she could insert a USB stick that is programmed with a function to automatically extract saved passwords in the browser.

How to combat USB hacking..

a. - Do not leave your laptop unattended.

b. - Install software that tells your computer not to accept unrecognized devices.

8. Man in the Middle Attack

If the victim and attacked are the same LAN and on switch based network, a hacker can place himself between the client and the server, or he could also act as a default gateway and capturing all the traffic in between.

9. Botnets

A botnet is basically a collection of compromised computer. The infection process is same as the key logging, however a bonnet gives you additional options for carrying out attacks with the compromised computer.

Some of the most popular bonnets include Spyeye and Zues.

10. DNS Spoofing

If both the victim and attacker are on the same network an attacker can use a DNS spoofing attack and change the original Facebook.com page to his own fake page and hence can get access to victims Facebook account