Connect with us

Technology

5 ways to make your Facebook account bulletproof

Published

on

5 ways to make your Facebook account bulletproof

Join Fox News for access to this content

Plus special access to select articles and other premium content with your account – free of charge.

Please enter a valid email address.

By entering your email and pushing continue, you are agreeing to Fox News’ Terms of Use and Privacy Policy, which includes our Notice of Financial Incentive. To access the content, check your email and follow the instructions provided.

Having trouble? Click here.

Scammers are constantly looking for ways to access your Facebook account. It doesn’t matter who you are; they want your information. They’re even stealing accounts from dog shelters. And if they get in, some users say recovering your account is a hassle. That’s why it’s important to make sure your account is locked down.

Here’s how to keep your Facebook account secure and safe from any potential scammers or hackers.

Advertisement

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS AND EASY HOW-TO’S TO MAKE YOU SMARTER

Facebook app on a smartphone (Kurt “CyberGuy” Knutsson)

1) Change your Facebook password 

One of the biggest things you can do is use a secure password on your account. Make sure it’s different from your other accounts. However, with data leaks becoming more frequent, it would be wise to change your passwords frequently — we recommend every three months.

How to change your password from your computer

  • Log into your Facebook account
  • Click the Account icon at the top right of the page (where your Profile picture should be)
  • Select Settings & Privacy
  • Select Settings
  • From the menu on the left of the screen, in the “Meta Accounts Center,” click “See more in Accounts Center
  • On the next page, click “Password and security” towards the bottom of the left-hand navigation
  • Select Change Password
  • Choose an account to make changes. Select your Facebook account.
  • Enter your current password and then your new one twice to confirm in the edit fields
  • Tap on Change password

How to change your Facebook password from your iPhone

Changing your Facebook password from your iPhone is not much different from changing it from your computer. Here’s what you do:

  • Open the Facebook app and make sure you are logged in with the account for which you want to change the password
  • Tap the Facebook Menu button in the bottom right of the screen
  • Now tap Settings & Privacy
  • Click Settings
  • At the top in the “Meta Accounts Center,” click “See more in Accounts Center
  • On the next page, click “Password and security
  • Select Change Password
  • Choose an account to make changes. Select your Facebook account.
  • Enter your current password and then your new one twice to confirm in the edit fields
  • Tap on Change password

How to change your Facebook password from your Android

Changing your Facebook password from your Android also has very similar steps. Keep in mind that many Android phones act slightly different from one another, so these instructions may be similar, though not exact, for your phone and version of Android software.

  • Open the Facebook app and make sure you are logged in with the Facebook account for which you want to change the password
  • Tap the three horizontal lines on the navigation bar at the top of the screen
  • Tap Settings and Privacy
  • Then tap Settings 
  • At the top in the “Meta Accounts Center,” click “See more in Accounts Center
  • On the next page, click “Password and security
  • Select Change Password
  • Choose an account to make changes. Select your Facebook account.
  • Enter your current password and then your new one twice to confirm in the edit fields
  • Tap on Change password

Use a password manager

Consider using a password manager to generate and store complex passwords for your Facebook account. It will help you create unique and difficult-to-crack passwords that a hacker could never guess. Second, it also keeps track of all your passwords in one place and fills in passwords for you when you’re logging into an account so that you never have to remember them yourself. The fewer passwords you remember, the less likely you will be to reuse them for your accounts.

5 ways to make your Facebook account bulletproof

Facebook account on laptop (Kurt “CyberGuy” Knutsson)

MORE: DON’T FALL FOR THAT ‘LOOK WHO DIED’ FACEBOOK MESSAGE TRAP

2) Set up two-factor authentication

Also known as 2FA, two-factor authentication has become a standard security setting. Working from home has made this even more common, as companies want to make sure you’re on a secure network before you use their programs. While it might seem annoying to follow a few extra steps to log in to your Facebook account, it’s worth it to protect your account from anyone else getting in.

Advertisement

Two-factor authentication requires you to approve a login on a separate device, so you’ll need to enable this feature on a desktop computer and then make sure you have the Facebook mobile app installed and logged in on your smartphone. Here’s how to turn it on from your computer:

  • Click the profile icon in the top right corner
  • Click Settings & privacy 
  • Click Settings
  • At the top in the “Meta Accounts Center,” click “See more in Accounts Center
  • Select Passwords and security on the left-hand sidebar
  • Click Two-factor authentication
  • Choose your account
  • Follow the prompts to enable two-factor authentication

Here’s how to turn it on from your smartphone:

  • Open the Facebook app
  • Tap the Facebook Menu button in the bottom right of the screen
  • Now tap Settings & Privacy
  • Click Settings
  • At the top in the “Meta Accounts Center,” click “See more in Accounts Center
  • On the next page, click “Password and security
  • Click Two-factor authentication
  • Choose your account
  • Follow the prompts to enable two-factor authentication

MORE: HOW TO OUTSMART CRIMINAL HACKERS BY LOCKING THEM OUT OF YOUR DIGITAL ACCOUNTS

3) Set up alerts for logins from unrecognized devices

You can opt in for text messages and email updates if anyone logs into your Facebook account from a device you haven’t marked as a recognized device. You can also have the notification pop up on your Facebook app. Here’s how to set up alerts for logins from unrecognized devices on your computer:

  • Click the profile icon in the top right corner
  • Click Settings & privacy
  • Click Settings
  • At the top in the “Meta Accounts Center,” click “See more in Accounts Center
  • Select Passwords and security on the left-hand sidebar
  • Scroll down, and under “Security Checks,” tap Login alerts.
  • Click the account you want to set up the alerts for logins from unrecognized devices
  • Then, check either in-app notifications or email 

Here’s how to set up alerts for logins from unrecognized devices on your smartphone:

  • Open the Facebook app 
  • Tap the Facebook Menu button in the bottom right of the screen
  • Now tap Settings & Privacy
  • Click Settings
  • At the top in the “Meta Accounts Center,” click “See more in Accounts Center
  • Click “Password and security
  • Scroll down, and under “Security Checks,” click Login alerts 
  • Click the account you want to set up the alerts for logins from unrecognized devices
  • Then, check either in-app notifications or email
5 ways to make your Facebook account bulletproof

Facebook app (Kurt “CyberGuy” Knutsson)

MORE: SCAMMERS ARE USING FAKE NEWS AND MALICIOUS LINKS TO TARGET YOU IN AN EMOTIONAL FACEBOOK PHISHING TRAP

4) Conduct a privacy checkup

Conduct a Privacy Checkup on your account about once a month to ensure it is still secure. Facebook will guide you through settings so you can ensure your data settings, ad preferences and search settings are all as you’d like them to be.

  • On a computer, click the profile icon in the top right corner of your Facebook page to find Settings & Privacy, then tap Privacy Checkup. Facebook will then guide you through some settings so you can make the right choice for your account. 
  • On a mobile app, tap Menu at the bottom right, then tap Settings & Privacy, then Settings and tap Privacy Checkup. Facebook will then guide you through some settings so you can make the right choice for your account. 

5) Never click suspicious links on Facebook

Do not click on suspicious links on Facebook, even if they appear to come from a friend or a company you know. This includes links as posts or in emails. Here’s what you can do to protect yourself:

Hover over the link: Most browsers show the actual destination URL when you hover your cursor over a link. Check if it matches the text displayed and looks legitimate.

Advertisement

Report suspicious links on Facebook. If you see a suspicious link on Facebook, be sure to report it. This helps keep the platform safe for everyone.

Have good antivirus software: The best way to protect yourself from clicking malicious links that install malware that may get access to your private information is to have antivirus protection installed on all your devices. This can also alert you of any phishing emails or ransomware scams. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.

How to recover your Facebook account if you’ve already been hacked

You may realize a hacker has taken over your account if you can’t log in, or you may notice some red flags while still logged into your account – like posts you didn’t create. If you’ve already been hacked, follow these steps:

  • The first step is to check if you still have access to the phone number or email you set up your Facebook account.
  • If you do, go to facebook.com, make sure you’re logged out of any other account and click Forgot Account.
  • Follow the on-screen instructions to receive a recovery link to your email or phone number.

If you do not have access to the phone number or email associated with your Facebook account, head to facebook.com/login/identify. You’ll be able to fill out a form to have Facebook review your account while answering a few security questions to prove the account you’re trying to recover is yours. You’ll have to provide proof of ID, like a photo of a driver’s license. We understand there is hesitance to upload your ID, but Facebook says these uploads are encrypted and stored securely.

Another option:

  • Go to facebook.com/hacked from any device.
  • Notify Facebook about your compromised account.
  • Choose the relevant reason to help Facebook comprehend the situation. Then, proceed by clicking on Continue.
  • Facebook will prompt you to enhance your account settings. Initiate the process by clicking on Get Started.
  • Subsequently, it will commence evaluating your passwords, email addresses, connected apps and other pertinent details.
  • After selecting the reason, click on the Get Started button.
  • Upon completion of the analysis, you will be provided with the option to change your password once your email address is verified.
  • Follow the prompts to regain access to your Facebook account.

Kurt’s key takeaways

While locking down your Facebook account seems like a lot of work, it’s worth it. The peace of mind you’ll have knowing that hackers will have a hard time breaking into your account is priceless. Recovering your account can be difficult, so it’s better to get ahead of any hackers.

Do you feel like Facebook’s parent company, Meta, is doing enough to protect your Facebook account from hackers? What else do you think should be done to protect your account? Let us know by writing us at Cyberguy.com/Contact.

Advertisement

For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

If you absolutely must sing along with Wicked, do it here

Published

on

If you absolutely must sing along with Wicked, do it here

In response to the utterly baffling discussion as to whether people should be allowed to sing along with Wicked in theaters (absolutely not), Universal is rolling out a bunch of screenings specifically for the folks who fancy themselves background vocalists.

Universal announced today that special interactive, sing-along Wicked screenings are making their way to theaters in the United States, Canada, and select international markets beginning December 25th. In addition to on-screen lyrics for people who aren’t yet off-book, the screenings will feature a special message from stars Arianna Grande and Cynthia Erivo (who has previously come out in favor of audience participation).

In a statement about the screenings, Universal’s president of domestic theatrical distribution Jim Orr described them as a unique opportunity for fans to “become part of the story they’ve embraced so enthusiastically.” But for those of us who just want to leave the singing to the professionals, this sounds like the studio is making sure that we can watch the movie in peace.

Continue Reading

Technology

Chinese hackers target US telecoms: What you need to know to protect your data

Published

on

Chinese hackers target US telecoms: What you need to know to protect your data

U.S. telecom giants are under constant attack from Chinese hackers. A federal investigation has uncovered a massive cyber espionage campaign by the Chinese government, targeting U.S. telecommunications networks to steal Americans’ information. A top White House official confirmed that at least eight U.S. telecom companies have been affected by this hacking spree. 

To combat this, the FBI and Cybersecurity and Infrastructure Security Agency (CISA) have released advice for telecom companies to help them detect and block the hackers while preventing future attacks. I break down the details of this Chinese hacking campaign and share tips on how to keep your data safe.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

What you need to know about the China hacking campaign

According to the FBI, hackers linked to Beijing have infiltrated the networks of “multiple” telecom companies, gaining access to customer call records and private communications of “a limited number of individuals.” Since this is an espionage campaign, they’re not interested in the average Joe’s texts or call history. Instead, their targets are Americans involved in government and politics.

Advertisement

The hackers also tried to copy “certain information that was subject to U.S. law enforcement requests pursuant to court orders,” according to the FBI. This suggests they might have been attempting to breach programs like those under the Foreign Intelligence Surveillance Act, which allows U.S. spy agencies to monitor the communications of individuals suspected of working for foreign powers.

Earlier this month, Deputy National Security Advisor Anne Neuberger shared new details about the scale of the Chinese hacking campaign. According to Neuberger, the U.S. believes the hackers managed to access communications from senior government officials and prominent political figures.

She explained that while the hackers were focused on a relatively small group of individuals, a limited number of Americans’ phone calls and texts were compromised. Neuberger also mentioned that the affected telecom companies are working to address the breaches, but none have been able to completely remove the Chinese hackers from their networks yet.

This campaign is believed to have started a year or two ago, according to the Associated Press. Authorities suspect a Chinese hacking group known as Salt Typhoon to be behind the operation.

Chinese hackers target US telecoms: What you need to know to protect your data

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

HERE’S WHAT RUTHLESS HACKERS STOLE FROM 110 MILLION AT&T CUSTOMERS

Advertisement

How are hackers able to access sensitive information?

Salt Typhoon managed to access call records and private communications by exploiting decades-old back doors in major telecom providers, including AT&T and Verizon, experts believe.

“The irony here is that the back doors exploited by the Chinese are, in fact, the same back doors that are utilized by federal law enforcement for purposes of conducting legal surveillance,” John Ackerly, CEO and co-founder of Virtru, a data-centric security company, told CyberGuy.

The vulnerabilities are a result of the Communications Assistance for Law Enforcement Act (CALEA), a federal law that mandates back doors in critical telecommunications infrastructure. CALEA enables law enforcement agencies to access phone records and metadata, including facilitating wiretaps, as part of authorized investigations.

“The problem with back doors is simple. They’re not selective. A back door created for law enforcement is, by its very nature, a vulnerability in the system. And vulnerabilities, once they exist, can be exploited by anyone who discovers them. Both good guys and bad guys can enter back doors,” said Ackerly, who previously served as a White House technology adviser.

Chinese hackers target US telecoms: What you need to know to protect your data

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

BEWARE OF ENCRYPTED PDFs AS LATEST TRICK TO DELIVER MALWARE TO YOU

Advertisement

The solution is end-to-end encryption

To protect private conversations and phone calls, cybersecurity experts recommend using end-to-end encrypted platforms. Jeff Greene, executive assistant director of cybersecurity at CISA, urged Americans to prioritize encrypted communication tools.

“Use your encrypted communications where you have it,” Greene advised, emphasizing the importance of secure platforms. He added, “We definitely need to do that, kind of look at what it means long term, how we secure our networks.”

An FBI official warned that citizens should be “using a cellphone that automatically receives timely operating system updates, responsibly managed encryption and phishing resistant MFA for email, social media and collaboration tool accounts.”

However, cybersecurity experts warn that these measures are not foolproof. The term “responsibly managed encryption” is problematic, as it intentionally leaves room for “lawful access,” such as the back doors required by CALEA.

“It’s clear that encryption with back doors is not actually responsible at all,” Ackerly said. “It’s time for the U.S. government to acknowledge and support end-to-end encryption as a stronger protection against foreign adversaries.”

Advertisement
Chinese hackers target US telecoms: What you need to know to protect your data

Illustration of a cybersecurity expert at work (Kurt “CyberGuy” Knutsson)

WHAT TO DO IF YOUR BANK ACCOUNT IS HACKED

10 ways to protect your personal information against cybersecurity threats

Now that we’ve discussed the threat, let’s take a look at the solutions. Here are 10 ways you can keep your personal information safe.

1) Use end-to-end encrypted platforms: For private communications, prioritize platforms that offer end-to-end encryption. This ensures that only you and the intended recipient can access your messages or calls, preventing unauthorized access by hackers or other third parties.

“Anyone can take control of their own data and protect themselves from security threats by using applications that provide end-to-end encryption. Whether you’re emailing, sending messages and files or video chatting, the only way to truly ensure your data is safe from bad actors is to encrypt it as it travels,” Ackerly said. “Choose an app or tool that is easy to use, so that you will actually use it.”

For texting, consider apps like Signal or WhatsApp. For email services, look for ones that offer easy-to-use end-to-end encryption. These platforms ensure that your private communications remain secure from unauthorized access. See my review of the best secure and private email services here.

Advertisement

2) Keep your device’s operating system updated: Make sure your cellphone and other devices automatically receive timely operating system updates. These updates often include important security patches that protect against new vulnerabilities exploited by hackers. For reference, see my guide on how to keep all your devices updated.

3) Enable two-factor authentication (2FA): Set up phishing-resistant 2FA on your email, social media and collaboration tool accounts. This adds an extra layer of protection, requiring more than just a password to access your accounts, making it harder for cybercriminals to steal your information.

4) Use strong antivirus software: Be aware of phishing techniques and remain skeptical of suspicious links, emails or phone calls asking for personal information. Cybercriminals often use these methods to gain access to your sensitive data.

The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

5) Encrypt sensitive data: Encrypt data on USB drives, SIM cards and laptops to protect information if devices are lost or stolen. Also, be sure to password-protect your sensitive files or folders by following these steps.

Advertisement

6) Implement strong password practices: Use unique, complex passwords for each account and consider using a password manager.

7) Regularly backup your data: Backing up your data helps protect against data loss from ransomware or device failure. You’ll want to back up your mobile deviceMac and Windows computers.

8) Be cautious with public Wi-Fi: Use a VPN (virtual private network) when connecting to public Wi-Fi networks to encrypt your internet traffic. This makes it harder for hackers and third parties to intercept your data, especially on public Wi-Fi. A VPN masks your IP address, helping to obscure your location and online activity. While VPNs don’t directly prevent phishing emails, they reduce the exposure of your browsing habits to trackers that may use this data maliciously. With a VPN, you can securely access your email accounts from anywhere, even in areas with restrictive internet policies. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

9) Invest in personal data removal services: Consider services that scrub your personal information from public databases. This reduces the chances of your data being exploited in phishing or other cyberattacks after a breach. Check out my top picks for data removal services here.

10) Use identity theft protection: Identity theft protection services monitor your accounts for unusual activity, alert you to potential threats and can even assist in resolving issues if your data is compromised. See my tips and best picks on how to protect yourself from identity theft.

Advertisement

Kurt’s key takeaway

There’s no denying that the U.S. is facing a serious cyberattack that puts millions at risk. What’s even more concerning is that hackers continue to exploit telecom providers even after the issue has been made public. The government and the affected companies must prioritize addressing this threat and patching the back doors these cybercriminals are using. We’re witnessing one of the largest intelligence compromises in U.S. history.

Do you believe the current laws around encryption and lawful access are enough to protect your privacy? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Continue Reading

Technology

Google reveals quantum computing chip with ‘breakthrough’ achievements

Published

on

Google reveals quantum computing chip with ‘breakthrough’ achievements

Google’s quantum computing lab just achieved a major milestone. On Monday, the company revealed that its new quantum computing chip, Willow, is capable of performing a computing challenge in less than five minutes — a process Google says would take one of the world’s fastest supercomputers 10 septillion years, or longer than the age of the universe.

Along with more powerful performance, researchers also found a way to reduce errors, something Google calls “one of the greatest challenges in quantum computing.” Instead of bits, which represent either 1 or 0, quantum computing uses qubits, a unit that can exist in multiple states at the same time, such as 1, 0, and anything in between.

As noted by Google, qubits are prone to errors because they “have a tendency to rapidly exchange information with their environment.” However, Google’s researchers discovered a way to reduce errors by introducing more qubits to a system and were able to correct them in real time. Their findings were published in Nature.

“This historic accomplishment is known in the field as ‘below threshold’ — being able to drive errors down while scaling up the number of qubits,” Google Quantum AI founder Hartmut Neven writes on Google’s blog. “You must demonstrate being below threshold to show real progress on error correction, and this has been an outstanding challenge since quantum error correction was introduced by Peter Shor in 1995.”

Willow, which has 105 qubits, “now has best-in-class performance,” according to Neven. Microsoft, Amazon, and IBM are working on quantum computing systems of their own.

Advertisement

Google’s next goal is to perform a first “useful, beyond-classical” computation that is both “relevant to a real-world application” and one that typical computers can’t achieve. Going forward, Neven says quantum technology will be “indispensable” for collecting AI training data, eventually helping to “discover new medicines, designing more efficient batteries for electric cars, and accelerating progress in fusion and new energy alternatives.”

Continue Reading

Trending