Facebook
is one place where you interact with clients -- someone gaining access
to your Facebook password and signing onto the site to pose as you could
damage the reputation of your business and even expose some of your
clients to a malicious user. Keep your password safe and change it
regularly to protect your privacy and your page.
Trojans and Viruses
Trojans
are a type of malware that, at first, look like normal webpages or
emails. However, interacting with them gives an attacker access to your
computer -- including your Facebook password. A trojan that lets someone
else access your files, passwords and activity is called a backdoor,
according to Kaspersky. (See Reference 3) Viruses, on the other hand,
are installed on your computer as files, either from external devices or
webpages.
Keyloggers
If
a keylogger is installed on your computer, the person with access to
the keylogger can get your Facebook password. A keylogger makes a record
of every key you press on a computer; the keystrokes are uploaded to a
file that can be accessed either on your computer or remotely, in some
cases. If you type in your Facebook password while you're being
keylogged, it will be saved in the file.
Past Incidents
In
2010, a virus that stole Facebook passwords was sent to some users with
a subject line that read "Facebook password reset confirmation customer
support," according to Reuters. (See Reference 1) Zeus, a piece of
malware that steals passwords and has hacked Facebook accounts, has been
affecting users since 2007. There's no report available on how many
people have been attacked by Zeus, but it is still a threat to computer
users as of July 2013.
Prevention
Being
cautious online is your best way to prevent your password from being
stolen. Unless you're sure you're on Facebook's site, don't type in your
Facebook password. Malicious webpages that request your password will
be able to see what you've typed into their password fields. Don't click
on links in emails that don't come from trusted senders and don't
interact with apps or programs -- even on Facebook -- that aren't made
by trusted companies or individuals. Keeping your virus protection
current is another way to prevent your computer from being infiltrated.
Melly
Parker has been writing since 2007, focusing on health, business,
technology and home improvement. She has also worked as a teacher and a
bioassay laboratory technician. Parker now serves as a marketing
specialist at one of the largest mobile app developers in the world. She
holds a Master of Science in English.
MESSAGES LOG IN EXPLORE HELP US EDIT Home » Categories » Education and Communications » Studying » Tests and Exams Article Edit Discuss Co-authored by Christopher Taylor, PhD Explore this Article Choosing an Exam Style Crafting Questions Checking for Difficulty Ask a Question Related Articles References At some point in every teacher’s career, they will have to write an exam for their students. For newer teachers, this can seem like an overwhelming task, given all that they teach in a course. However, you can understand everything you need to know about writing exams by identifying the exam’s purpose, determining what content should be included, and worki...
Skip to main content Posts Cashaa ICO - Get Bounty, FREE Tokens... Cashaa (Banking) Cashaa is a gateway to consumer-centric and affordable financial products aimed at consumer adoption of Blockchain without having to understand the technical details of Blockchain technology. Cashaa’s wallet system, integrated with the peer to peer exchange with full spectrum of fully digital financial services, enables its community to save, spend, borrow and get insured, with a simplified user experience in a legally compliant way. Token Sale ends in 8 DAYS $6,910,000 OF $32,000,000 (22%) WEBSITE WHITEPAPER social links 24 comments Read more WCEX ICO - GET FREE 100 TOKENS NOW! People like free things. It never ceases to amaze me just how many people will get into a line in order to receive a free 1 dollar ice cream cone. Nothing against ice cream, b...
Hackerz Land. This page for to-be hackerz and all about hacking ,cracks, warez etc. Monday, 17 June 2013 How to create a TROJAN and hack into anyone's computer. This tutorial will teach you how to use a R.A.T. & How to get them started. Many people get confused on how to use them. Requirements: Download Cerberus 1.03.4 Beta.: http://www.mediafire.com/?mtmzut0lygj Step 1.) Browse to the Cerberus folder, and run Cerberus.exe as shown. Step 2.) The client window will be displayed. This is the main window which would be displaying a list of connections and their info, had you actually any victims online. Of course at the moment, it is empty. But when you do have victims, you would right-click on their name/icon to bring up a pop-up menu which would provide...