{"id":12805,"date":"2017-07-30T15:11:43","date_gmt":"2017-07-30T20:11:43","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=12805"},"modified":"2017-07-31T10:21:09","modified_gmt":"2017-07-31T15:21:09","slug":"signs-social-media-account-hacked","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/signs-social-media-account-hacked\/","title":{"rendered":"Signs That Your Social Media Account Has Been Hacked"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The typical signs of a hacked social media account can be easily pinpointed: weight loss ads claiming that users can \u201cLose 10 pounds in 2 weeks with this new pill!\u201d or giveaways telling users to \u201cSign up now! Giving away free 5,000 iPads!\u201d Sometimes, though, compromised accounts are harder to pinpoint, giving hackers access to personal data for weeks before the breach is detected. One easy preventative measure that you can take is to activate the Applock feature. Click here to lock your sensitive apps:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/vault\" rel=\"attachment wp-att-9872\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-9872\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/lock-your-apps-300x76.jpg\" alt=\"lock-your-apps\" width=\"300\" height=\"76\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/lock-your-apps-300x76.jpg 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/lock-your-apps.jpg 313w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><center><\/center><\/center><span style=\"font-weight: 400;\">By using Applock, Android users can choose to protect certain apps with a password and safeguard this sensitive data from thieves and hackers. It\u2019s a simple, but effective, way for your apps to remain private, even if your phone\u2019s screen is unlocked.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/protect-applications-secure-password\/\"><b>How to Protect Your Applications With a Secure Password<\/b><\/a><\/p>\n<p><b>Signs of a Compromised Account<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The top two signs of a compromised account include changes to posts and changes to follower counts. While the appearance of numerous new posts is a common sign of hacking, so is the disappearance of older posts. Hackers taking over Facebook or Instagram accounts often delete old posts and photos. In addition, dramatic changes in follower counts, either in the number the account is following or the number of followers, often point to a hacking incident as well.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In some instances, hackers will change the account\u2019s information immediately after accessing it, shutting out account owners. In these cases, repeated, incorrect password entries are a sign of a compromised account rather than a forgotten password. Additionally, on social media sites that allow messaging, and on Twitter in particular, hackers will send infected links to mutual followers in an effort to compromise more accounts.<\/span><\/p>\n<p><b>Logins from Other Devices<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Social media giants such as Facebook will often track the devices associated with specific accounts, and notify users when a login has been attempted from a device not previously associated with the account. However, there\u2019s an easy way to double check individual accounts. Facebook provides users with data on the devices and locations of past and active login sessions, and allows users to end sessions for unfamiliar devices. To view this service, visit the Facebook account settings page and go to the \u201cSecurity\u201d tab. Under this section, users should click \u201cWhere You\u2019re Logged In\u201d to view all recent login data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Twitter offers a similar tool which lists the times of recent logins and types of devices associated with the logins. To access the tool, click your account\u2019s avatar at the top of the screen and click on \u201cSettings and Privacy.\u201d From the \u201cSettings\u201d screen, go to \u201cYour Twitter Data\u201d on the left-hand side of the page and scroll down to see \u201cYour Devices and Login History.\u201d<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some social media hacks are obvious. Others, not so much. Regardless of which type, here are a few key signs your accounts have been compromised.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[942,252,306,195,309,1853,421],"class_list":["post-12805","post","type-post","status-publish","format-standard","hentry","category-security","tag-app0","tag-app1","tag-app4","tag-app5","tag-app7","tag-hacked","tag-social-media"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=12805"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/12805\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=12805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=12805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=12805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}