Facebook has a history of being hacked, but the latest reports suggest that even if you’re a regular user, your password could be stolen by hackers.
Facebook’s password recovery page is an easy way to reset your password and make sure that it’s secure. But if you’re not careful, it could put your account at risk.
Here are seven sneaky ways that Facebook passwords can be hacked:
Suspicious Emails
It’s not uncommon for hackers to send out emails with links or attachments containing malware. If you receive an email from someone claiming to be from Facebook with a link in it, don’t click on it — even if it looks authentic.
Phishing
Phishing is the practice of sending fake messages with links in them to gain access to personal accounts. This can happen via email or through fake Facebook pages and apps created by cybercriminals.
Fake Facebook Buttons
A fake Facebook button is a small piece of code that can be used to steal private information from your Facebook account. It looks just like a real Facebook button, but it’s actually a piece of malware that gives hackers access to your password and other private information.
Facebook has been hacked before — in 2011, an attacker used a fake newsfeed button that displayed stories
Password Spraying
This is a type of password cracking, when your password is being read by a machine and then sent back to the hacker. The hacker just needs to have access to a computer that can be used for password spraying.
Plain Password Grabbing
This is another type of password cracking, when your password is being read by a machine and then sent back to the hacker. The hacker just needs to have access to a computer that can be used for plain password grabbing.
Keylogging
This is an attack on your computer where your keystrokes are recorded and sent to the hacker. You can use keyloggers by yourself or you can get one from someone else who has already done so.
Unsecured Networks
This is an attack where hackers get into your computer through a wireless connection, such as Bluetooth or Wi-Fi, without any authentication or encryption protection in place, thus resulting in complete access to all files stored in their system; this includes all personal information like emails, documents, photos etc.
