Hacker Up on Facebook Security by McCarthy Linda
Author:McCarthy, Linda [McCarthy, Linda]
Language: eng
Format: azw3
Tags: cyberbullies, malware, clickjacking, phishing, passwords, Facebook, social, security
Publisher: One Hundred Page Press, Inc.
Published: 2016-02-27T16:00:00+00:00
Bad apps
Bad apps are deliberately malicious Facebook apps. The entire point of a bad app is to gain access to your Facebook account in order to use and abuse your personal information.
It’s important to download apps from reputable sites, but even reputable sites can serve up malicious apps, so always go a step further and read the reviews before downloading a new app. Two popular Android phishing apps that made their rounds in 2015 were Cowboy Adventure and Jump Chess. These bad apps, which collected Facebook users and IDs, were made available for download from a reputable site, the Google Play Store. Once the apps were downloaded and installed they popped up a Facebook login screen tricking users into giving up their usernames and passwords. Although Google removed the apps from the Play Store, experts report that as many as 1 million users were tricked, possibly many more. How did savvy users avoid these bad apps? Some read the reviews. Others knew that Facebook never asks you to log back in once you have logged in.
If you’re concerned about a Facebook app that you’ve already installed, you can remove it. Within Facebook mobile app, menu names and functions vary between devices. For details on any particular function, please refer to the Help section.
If you’re using a laptop or desktop computer:
•Click the down-pointing triangle at the far right of the Facebook menu bar.
•Click SETTINGS on the drop-down menu.
•Click APPS in the left pane. App settings will display in the right pane with LOGGED IN WITH FACEBOOK apps displayed at the top left.
•Mouse over the name of any app you want to remove. An X will display to the right of the app name.
•Click X to remove the app.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(15267)
The Mikado Method by Ola Ellnestam Daniel Brolund(12533)
Hello! Python by Anthony Briggs(12399)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11726)
Dependency Injection in .NET by Mark Seemann(11525)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10532)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10340)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(10022)
Grails in Action by Glen Smith Peter Ledbrook(9663)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(9293)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9146)
Hit Refresh by Satya Nadella(9040)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8494)
The Kubernetes Operator Framework Book by Michael Dame(8478)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8300)
Robo-Advisor with Python by Aki Ranin(8255)
Practical Computer Architecture with Python and ARM by Alan Clements(8227)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8197)
Building Low Latency Applications with C++ by Sourav Ghosh(8103)