Skip to main content

Top 5+ ways to protect your Social Media accounts




Image result for Secure social media accounts



Image result for email picture


#1: Email Usage:-



The very important thing that most of the people don’t apply while making up the social media accounts is they tend to make up different emails for their new social media account and use up the same email that is already being used for many other purposes before. Try to make the different emails for every different social media account as this will help preventing the malware and the other security issues too.


#2. Use Your Number:-


Image result for phone number wallpaperYou should provide your phone number in the account profile of your social media as this can help to prevent up the password encryption attacks on the account of yours and hence it can also help you notify about every new login from any other device. This phone number can then also be used as the emergency recovery option for your account that can help to keep your account really much safe.

#3. Change Password Regularly:-


Get into the habit of updating your social media accounts passwords regularly. This will make sure that your accounts haven’t been logged into other unknown devices. While putting up the password make sure to use an alphanumeric password.


#4. Check Your Emails For Fake Logins:-


Most of the hacking attempts start with your Email account. It is suggested that you should block any login attempt that seems suspicious. If you ever got a notification regarding a hacker was trying to access your social media account, change your password right away.

#5. Avoid Clicking Short Url's:-


Don't Click on Short URLs


Did you recently receive a shortened URL from your friend or an unknown person? Think twice before clicking on it. Hackers have found a way to hide malicious scrips inside an URL. Sometimes, those shortened URL redirect users to a fake phishing site and users end up giving up the passwords.

#6. Don't install unknown apps and check your device regularly:-

We access our social media accounts from computer and smartphone. Hackers just need to install an app on your smartphone or computer to track whatever you are doing on the internet. Therefore, make sure to look for the suspicious apps on your computer & smartphone

#7. Avoid using HTTP:-




Always Use HTTPSWhile accessing your social media account make sure you have an HTTPS connection. This step will prevent information from being accessed while it’s being transmitted in the web. Using a VPN service will also add an extra layer of security.

#8. Delete accounts that aren't now used by you:-


Well, we often make accounts of social media or any other platform and forgets about it. Do you know? Your accounts can be compromised without being noticed? Just imagine if hackers can leverage these and access other linked accounts? Well, to avoid such scenarios, you should close accounts which you no longer use


Delete The Accounts That You No Longer Use


#9: Update your Mobile apps frequently:-

Update your mobile apps


We got to admit that we all love to visit social media accounts via our smartphones or tablets. However, make sure to have the latest version of the apps which you are using. Security patches protect you from the newest known threats.



Note:

If you want to join our whatsapp group to learn ethical hacking and programming from expert tutors and get latest  tech news on your whatsapp number you can contact  us on +92-3374887910. Group yearly fee is $12. Those who are interested can contact us ASAP.

Course Include:

  •  C Programming
  • Python programming
  • Ruby programming
  • C++ programming
  • Java programming
  • Perl programming
  • Java script
  • web development
  • Linux
  • Windows
  • Mac
  • Networking
  • Cryptography
  • Mathematics
  • Social Engineering

Thanks for Reading!

Comments

Popular posts from this blog

How long would humans survive if the sun disappeared?

Well, we wouldn't die instantly. We already survive every day for 8-16 hours without the sun (depending on the season and location). I'm assuming the intent here is to ask what would happen if the sun were to just suddenly cease to exist entirely. In that case, it would take about 8 minutes for anything to happen to us, since the sun's light and gravity both propagate at that speed. At that point the Earth and moon would just continue on in a straight line, no longer in orbit around the sun. Losing the sun's pull might have some nasty effects on plate tectonics, but I'm not sure about that. The earth would slowly begin to cool. It wouldn't be instantaneous; the atmosphere does a decent job of retaining heat for a time. How long you have here depends on the climate and season where you are. If it's the dead of a snowy winter, temperatures would become nearly unbearable in 24-48 hours. If it's summer, you might have several days. This alone ...

Can a Facebook account be hacked?

Top 15 Ways How Hackers Hack Facebook Accounts #1 Hack Facebook Account Password By Phishing : Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In simple phishing attacks, a hacker creates a fake login page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim logs in through the fake page the, the victims “Email Address” and “Password” is stored into a text file, and the hacker then downloads the text file and gets his hands on the victim’s credentials. How To Avoid Phishing Attacks Never Login your Facebook account on other devices Use Chrome, it identifies the phishing page. Avoid emails that ask you to log in your facebook account #2 Hack Facebook Account Password By Keylogging : Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers...

Difference between hacker and cracker?

Hacker: In computing, a hacker is any  skilled  computer expert that uses their technical knowledge to overcome a problem. While " hacker " can refer to any skilled computer programmer, the term has become associated in popular culture with a " security hacker ", someone who, with their technical knowledge, uses  bugs  or  exploits  to break into computer systems. Cracker: A cracker is someone who breaks into someone else's computer system, often on a network;  bypasses  passwords or licenses in computer programs; or in other ways intentionally  breaches  computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there. Some breaking-and-entering has been done ostensibly to point out weaknesses in a site's security system.