What can you do about that messy Facebook data breach?


An old data breach is still a data breach, and you will probably still need pay attention when it has to do with Facebook, a site that most people have used at some point. As you probably have already heard, a past Data leakage affecting 500 million Facebook users is circulating once again after a hacker posted a large amount of deleted personal information of hacked accounts. And eeven though the actual hack took place two years ago, you can still take some preventative measures to make sure this latest incident It does not affect you a lot.

To get started, take the It’s time to check and see if your data, including your email address, phone number, name, and other identifying characteristics, even appears in such a breach. Try one of these options to search for different identifying information that may have been compromised:

If your phone number or other details they are not in the gap, great! You are well. If so, there isn’t much you can do about it, now that the the information is Out and about. On the bright side, andyou do not have to worry about your password having been stolen, but this data could be used in identity fraud Attempts elsewhere, and possibly even to reset your passwords or brute force input in your accounts, depending on how bad a service’s password recovery / reset mechanism is.

All that said, given that this data has been floating for some time, it is very likely that are not affected if you have not already done so condition affected. If anything else, the The entire episode shows the importance of using fictitious information. where possible when registering for an account, especially on social media. Obfuscation is totally under your control. No You feel you have to give up legitimate details about your life.

For Facebook, which could include:

  • Do not provide any optional information if it is not necessary (your educational history, all the places you have lived, your interests, your work history, etc.)
  • Provide fictitious information when requested, such as a false date of birth or a pseudonym. (Keep a record of these in the notes section of your favorite password manager in case you are ever questioned about your false information to regain access to your account or reset your password).
  • Using a fake email address (even a slightly modified one, like [email protected] instead of [email protected]) and a phone number that is not your real phone number to sign up for an account. As before, save these credentials in your password manager just in case.
  • Use a different “real” name or a slightly modified version of your name. Don’t use the same “screen name” or account name across your different services (something we’re all guilty of, no doubt).

Why does this matter? It makes it much more difficult for attackers to use the information obtained from a data breach to affect you elsewhere. If you always use different information whenever possible across the different services you use, it will be more difficult for an attacker to socially engineer to get into your account.hey they just won’t know enough about you at every service.

In the future, make sure you are aware of any potential phishing attempts. If you receive a text message or email out of nowhere trying to convince you of its legitimacy by providing information (now available) about yourself, do not take action on a service based solely on in that message. Do not give anyone else any other information in response. Do not click or touch the links if you are not sure where they came from. Instead, pFill in your browser, visit the service directly and check if there really is something you should take care of.

.

Source link