-->

Header ads

How to protect your social media account and email from hackers



 How to be safe from

hackers and some

 precautions to use social

 media.

 I used to write about this topic a long time ago but now I feel the need to write because some friends, including my personal Facebook account, have been unsuccessfully tried to access my Facebook account by internet hackers. Unfortunately, some friends are using the internet.  Unaware of the precaution their personal accounts were also seized by the Destroyers.


 First of all, it should be noted that when we are connected to the Internet, none of our data and information is secure. Any trusted applications that we download from trusted sources like Android or Apple, etc., without all our data, but relatively  Be safe because third parties cannot access it.


 For example, if we use WhatsApp, Facebook, Telegram, Instagram, etc., if we do not make mistakes in using it and do not fall into the trap of hackers, then the third party ie hackers will not be able to access our messenger or WhatsApp etc.


 Because there is a complete security protocol available by the agencies of these applications that even in a few seconds these security codes and protocols change which is far beyond the ability of a hacker.


 What are the mistakes we make in handing over our secret social media documents to hackers?

  When we download an unknown app from an unknown source.

 Or send a link to download this funky program

 Remember that hackers can even touch the hidden file of a hack with a photo or an application that with the installation of the application we do not take permission of mobile storage data, mic camera etc. and thus give hacker access to our mobile.  Can.

 Unlocking Facebook from an unknown link or browser is a big mistake.

 Some internet hackers in Afghanistan today have created a link and posted that you should check your Facebook to see if it is safe or not, or say you should change the color of your messenger or Facebook or say you should increase your likes etc.  Then he tells you to click this link and open Facebook, so opening Facebook requires a username and password and whenever we enter our username or password in that link, Darik goes to the same hacker's mobile who created this link.


 Hackers can also touch the link with the image or video. When we see an image or video with an unknown link, we should avoid opening it so that they can know your location.


 Never open your personal social media account on another person's mobile for even a minute as there is an application that he has installed in the mobile so he secretly saves all usernames and passwords.


  One of the great hallmarks of hacking apps is that they are much smaller in size and KB instead of MB.


 Some hackers will stop the application and re-install it after you install it but it does not seem to be difficult to delete it on your mobile. Malware bytes are a good application in the Play Store for such lost and hidden applications that detect dangerous applications.


  There is a play protect option in the play store settings that sometimes indicates a dangerous application to run.


 Some other important safety points of Facebook.

 We have to give two step verification on Facebook so that after username and password, code will also come to our email or mobile.


 If you want to see if Facebook is open on another mobile phone, go to security and login in settings and check it.  If it was open on another mobile and another location, change the password, logout all and then unlock your mobile again.


 Be sure to give email and mobile number to Facebook.


 Always do these things in your information instead of just me

 Publishing the first date of birth seems easy to us but it is very easy for a hacker to get into your Facebook.

 Keep mobile number secret

 Keep email secret.

 Never open an unfamiliar link in Messenger.


 You can also give a two step password to WhatsApp and Telegram.


 The Devices option in the Telegram setting shows us whether or not our Telegram is open elsewhere.


 In using imo, it is important to take care that the number on which the imo is created is very safe as the same imo can be created on another mobile.


 Another note is that your mobile phone containing your confidential and confidential data should be sold first, but not because it sells and recovers data from used mobile phones in the market, and if you must sell it, then format the mobile phone again.  Delete the useless data according to the size of the mobile then format it then insert the same useless data files, images etc. Then format it. Do this three times then your data will not be recovered in recovery but this useless data will be recovered.  is recovered.


 Do not open your email on someone else's mobile and do not allow anyone else to open your email on your mobile.


 Right now I have so many words in mind

 to be continued ......


Post a Comment

0 Comments