What happens when FB hacked?

Asked by Last Modified  

Follow 1
Answer

Please enter your answer

If your FB account has been compromised, it likely has been used to contact people in your friends list. You'll need to tell them not to trust any links or install any apps that you had sent them through wall postings, Facebook messages or Facebook email , while the intruder had control of your accou...
read more
If your FB account has been compromised,it likely has been used to contact people in your friends list. You'll need to tell them not to trust any links or install any apps that you had sent themthroughwall postings, Facebook messages or Facebook email , while the intruder had control of your account. read less
Comments

Related Questions

Which laptop is best for hacking, windows or IOS?

Go for Windows laptop with minimum intel i5 8th gen, AMD ryzen5 and 8-16 GB ram, and install VMware or Virtual Box to run Kali Linux or Parrot security OS. Linux OS (Kali Linux and Parrot Security OS are...
Durvesh
How many types of hacking are there?
Hacking can be of many types. Basically what you want to know is not clear. Can you elaborate your question Deepak.
Deepak

what is the job of bug bounty hunters called

Clients will pay you once you find any vulnerabilities in the applciation.
Kunal
0 0
8
What is the minimum course fees for ethical hacking courses?
Full fledged Information Security training with placement opportunity on successful completion. Also Ethical Hacking with certification.
Reshma
Do i get short term course in Dehradun, like ethical hacking and cyber security?
You can take online class...whatsup at institute number
Akarshi
0 0
6

Now ask question in any of the 1000+ Categories, and get Answers from Tutors and Trainers on UrbanPro.com

Ask a Question

Related Lessons

Types of Ethical Hackers
This is the internet age! The more that we use the internet and technology, the more we are vulnerable to Hacking and Data theft, Ethical Hacking going to play the best role in this era There are mainly...

Diploma in Cyber Security & Forensics
Program Highlights: * Computer Fundamentals & IT Applications * Core Java * Web & Graphics Designing * Python Language * Linux * Advance Android Development (Application...

Ethical hacking : Important points for beginners
Dear passionate learners, I am posting below lesson to create enthusiasm among you all for learning ethical hacking . A beginner in Ethical Hacking is always in dilemma. Below are some misconceptions,...

Social Engineering
Social Engineering is the art of manipulating human mindset and convincing people to reveal confidential information Factors that make companies vulnerable to Social Engineering Insufficient Security...

How to get into cybersecurity in 2024
Demand for Cybersecurity professionals is high and growing Entry-level positions may not require a formal degree and instead prioritize skills Coming from a technical field with transferable skills...

Recommended Articles

Business Process outsourcing (BPO) services can be considered as a kind of outsourcing which involves subletting of specific functions associated with any business to a third party service provider. BPO is usually administered as a cost-saving procedure for functions which an organization needs but does not rely upon to...

Read full article >

Hadoop is a framework which has been developed for organizing and analysing big chunks of data for a business. Suppose you have a file larger than your system’s storage capacity and you can’t store it. Hadoop helps in storing bigger files than what could be stored on one particular server. You can therefore store very,...

Read full article >

Applications engineering is a hot trend in the current IT market.  An applications engineer is responsible for designing and application of technology products relating to various aspects of computing. To accomplish this, he/she has to work collaboratively with the company’s manufacturing, marketing, sales, and customer...

Read full article >

Information technology consultancy or Information technology consulting is a specialized field in which one can set their focus on providing advisory services to business firms on finding ways to use innovations in information technology to further their business and meet the objectives of the business. Not only does...

Read full article >

Looking for Ethical Hacking Training?

Learn from the Best Tutors on UrbanPro

Are you a Tutor or Training Institute?

Join UrbanPro Today to find students near you