fbpx
How Hackers Use Social Media To Access Your Accounts

How Hackers Use Social Media To Access Your Accounts

Hackers use social media sites as fertile beds as information about you. Think hard about what you share on social media sites. Now think about the passwords you use to access your accounts.

Information such as your dog’s name, the name of your children, partner, or parents is generally posted along with pictures and videos. If you are using that same information to create passwords, now would be an excellent time to change them.

Don't use your dogs name as a password

Don’t use your pets name as a password

Look at it from the fraudster’s point of view. If your goal is gathering as much personal information about a stranger as possible, one obvious and easy place to start would be social media accounts. Once enough data is collected, access to personal accounts and especially cell phones becomes much more accessible. And the goal of accessing your mobile phone account is simple.

A high percentage of people now do at least some of their banking through mobile apps. Take a moment and let that fact sink in.

How Hackers use Social Media sites

A high percentage of people now do at least some of their banking through mobile apps. Take a moment and let that fact sink in.

Hackers use social media to access your accounts by what is now known as social engineering. To accomplish this, they can begin with as little information as your name and phone number.

One of the latest types of hack plaguing the telecommunications industry is called a SIM swap. Fraud through social engineering happens typically by phone, but the hackers are now utilizing text messaging and online chats more every day. The process usually begins with hackers using the information gained on social media to call your telecommunications company’s customer service department. They will be persuasive and charm an unsuspecting customer service representative into believing that they are the account holder.

How hackers swap SIM cards

Once the hacker has access to your phone account, they will request to do the SIM swap. Then, once they have successfully swapped out your SIM card for their own, they will have immediate access to any mobile apps you have downloaded. They will also have access to any user names and passwords you have saved intentionally or not deleted from your phone’s history.

hacker or criminal use phishing to steal online money

Also, it is essential to remember that hackers can call the company over and over again. They do not have to succeed on just one call ultimately. They can continue to call, each time speaking with a different representative to gain information little by little until they succeed. At this point, the victim is usually unaware that they are being hacked because any potential alerts are being directed to the hacker, not the legitimate person on the account.

Pages ( 1 of 2 ): 1 2Next »

Check Also

Why Eating Shark Meat is Dangerous and Unhealthy

Have You Been Tricked Into Eating Dangerous Shark Meat?

Have You Been Tricked Into Eating Dangerous Shark Meat? Have you been tricked into eating …

29 comments

  1. Excellent information and great material to deepen and improve our knowledge about the world, very entertaining reading, Thank you.

  2. Wow, I did not think that this way they could invade my privacy, although it is not good to always think that someone is going to hack your account … Although I do think that we should improve our security a bit. Excellent post! it has been helpful and enjoyable!

  3. This information is excellent to be aware of hacker attacks. It is a good content suitable for all audiences and the truth is very useful because today there are many dangers on the internet and it is good that people educate themselves

  4. Very good information, it’s great. I support every word.This worked a lot for me to make the right decision

  5. Excellent information, is very complete and helpful. Thank you so much for sharing this magnificent work

    • I really like the article it’s too interesting , this kind of topic is one of my favorites to read, thanks

  6. Thank you for sharing this valuable information. it is really very important to know this to avoid getting hacked.

  7. Very interesting article to be aware of how hackers can use your information from social networks

  8. Excellent information and great material to deepen and improve our knowledge about the world, very entertaining reading, Thank you. so much for sharing this magnificent work

  9. Incredible post, it really is interesting information, thanks for sharing

  10. With millions of hackers lurking in cyberspace and ready to exploit any mistake you make, it’s essential not to let this useful information pass you by. Knowledge is power!

  11. Well, this is a reality that all internet users have to take into account and who often work or spend their free time in it, it is to create a conscience to protect themselves from these cybernetic pirates that what they want is to cause harm to vulnerable people .

  12. Brittany Ainsworth.

    I love the Post, excellent work doing both editing and material, continue with this good content, I hope you grow even more

  13. No se puede tener nada en la web. No hasta que pase a ser de autenticación incorrompible. No pongan su vida en la web. Todo lo importante tiene que ir a papel

  14. Thank you very much for making this post, it really helped me, it was very helpful, I hope other people take advantage of it as much as I do.

  15. isaias valera zurita

    Hackers are constantly learning to steal or impersonate identities, it is important not to share sensitive information on any social network

  16. Francisco Coronado

    It’s amazing how much information can be obtained from a person by researching details of his personal life. We definitely have to be more and more careful in how we protect our information.

  17. Amigo esta es una gran realidad actualmente aunque no se quiera aceptar, porque comunmente colocamos el nombre de alguien o de nuestras mascotas mas una fecha especial en nuestras contraseñas etc y etc, gracias por tan valiosa informacion !

  18. totally true, we must take care of our social networks, the internet is full of traps and we must know how to detect them. good post!

  19. The article is excellent, because it makes public knowledge certain tips to be able to keep your accesses safe to a certain point, because all information uploaded to the cloud is no longer private, the reason is because everything leaves a digital trail that hackers can follow, continue.

  20. grateful and totally pleased to get to this article, your requests are very interesting and help in many aspects, in my case it is, I will keep in touch for more publications of this quality and thus be able to continue learning from a great teacher like you

  21. Excellent article! Really informative and useful, loooved it

  22. I love this page, it has the necessary information to provide us with the tools we need on this subject

  23. good article. Hackers are definitely at the forefront in terms of tricks and methods of theft and fraud, we must be careful with any electronic operation that we do outside our home especially. we must be aware of our data at all times

  24. I find the information very interesting to protect our accounts on social networks, thanks for all the recommendations and suggestions … I agree with all of them, especially not to put the names of our pets or addresses, or identity numbers !!!

  25. im very happy with this post, have a information thats i need. very good redaction. thanks for share and keep it way

  26. santiago balladares

    good interesting,excellent,thank very good.

  27. Totally true, it really helped me … great material to deepen and improve our knowledge about the world, very entertaining, Thank you.

  28. This information is of great help to me, I really like the topic of hackers, the truth has always caught my attention, excellent.

Leave a Reply