Saturday, June 30, 2018


While the smartphone has made many of our work easier, there is also a concern about security. Where, when a hacker breaks into our smartphone and stole our most important information, this fear remains often. To overcome this, the scientists continue to develop a better security system. Many smartphones include facial recognition, fingerprint scans and other biometric systems. However, the trouble with these easy-to-use tools is that once compromised they cannot be reset.

But now, American scientists have developed a security system that will use the smartphone's password as the brain of the user after it's been in the market. Smartphones will be unlocked only by recognizing the brainwaves in response to a series of pictures - an advance that could better protect devices from hackers. According to the scientists at Buffalo University, electroencephalography (EEG) is currently a very easy system, through which the waves of the brain can be recorded.

"You can't grow a new fingerprint or iris if that information is divulged," said Wenyao Xu, an assistant professor at the University at Buffalo (UB) in the US. "That's why we're developing a new type of password - one that measures your brainwaves in response to a series of pictures. Like a password, it's easy to reset; and like a biometric, it's easy to use," said Xu.

The "brain password," which presently would require users to wear a headset, but in the future, it has to be tried to make it even better. It could have implications in banking, law enforcement, airport security and other areas.

"To the best of our knowledge, this is the first in-depth research study on a truly cancelable brain biometric system. We refer to this as 'hard cancellation,' meaning the original brain password can be reset without divulging the user's identity," said Zhanpeng Jin, an associate professor at UB.
get the latest hacking gist here
We have consistently seen various vectors of attack rear their head when it comes to Android smartphones. We’ve seen Shattered Trust, Cloak and Dagger, and Rowhammer, just to name a few. RAMpage is the latest one on the block, and while it is a hardware vulnerability, it doesn’t necessarily need physical access to your device to exploit. How it works is relatively simple.

A group of university researchers have discovered that this vulnerability could theoretically work on any device with LPDDR memory, which includes virtually every smartphone released since 2012, including some Apple devices.

When a CPU reads or writes a row of bits in the RAM module present on the device, the neighbouring rows are slightly affected due to a tiny electric discharge. This isn’t usually a problem as we know RAM does this and that’s why it’s periodically refreshed to make sure nothing goes wrong. But what if we start “hammering” the same “row”? What if we continuously read or write to the same row in order to disrupt neighbouring rows? This can cause a bit-flip in a memory row that we shouldn’t own or have access to at all. That’s what Rowhammer is, and it’s being used as part of a larger vulnerability called RAMpage. The CVE is CVE-2018-9442 and it affects devices shipped with LPDDR2, LPDDR3, or LPDDR4 RAM.

RAMpage can be used to gain root access on a device, but the researchers managed to get it to do a whole lot more as well. It could be used to bypass JavaScript sandboxes and even perform an attack running on another virtual machine on the same computer on x86 devices. ARM-based devices are also vulnerable, and that’s where our Android phones come in. DRAMMER stands for “Deterministic Rowhammer Attacks on Mobile Devices”.

The attack allows a hacker access to the entire operating system. This includes accessing the data stored by other applications, which the Android security model is meant to prevent. An attacker can gain full control of a device allowing them to obtain stored passwords, personal photos, emails, instant messages and even business-critical documents.
get the latest hacking gist here


Yet another stunning fact on MS17-010 vulnerability surfaces forcing the cyber security experts to concentrate on the ways and means to counter the threat that deepens on every passing day. Top researchers claimed to have found out that NSA Cyber weapon DoublePulsar has every possible chance to exploit the Windows embedded devices.
After the Shadow Brokers stood exposed last year, it has come to light that the hackers or attackers used the windows system when the NSA Tool, known as DoublePulsar---provided an exclusive and backdoor entry into it. That was what the conclusive findings of the research which involved a team of top cyber experts. During the research, the experts minutely examined DoublePulsar functioning on an Embedded Windows device. Only then, they got to know all about the DoublePulsar authors who never supported to an embedded device and instead the exploit was meant for Windows OS. The cyber security experts checked target here to ascertain the vulnerability and finally, deploying SMBTouch, they jumped into the conclusion that the target was really vulnerable to EternalBlue. After installing the backdoor on the target the cyber scientists came to discover that the modules of the MSF exploit authors failed to fix the support for windows embedded version. According to researchers, initially they created a DLL to the target host and then injected the DoublePulsar exploit into the embedded system. The research provided the scientists more facts on how the Windows Embedded devices exploit. According to what a researcher engaged in it said, a graphical view was allowed to play a crucial role in it. He said that the experts assumed that as the target machine starts running Windows7, it took the left course. Then it took the turn to ascertain whether the entire architecture system that kept running was indeed x64 or x86, which one was correct. On the contrary, the system keeps taking the right course if the target is far from being Windows 7. Then in right side, it perform OS checks. The system ends up on an error machine in the absence of any check for the windows embedded. In fact, the error takes place only for not checking the windows embedded devices as the exploit was found to have been functioning against target. Only after these crucial but interesting happenings, the researchers made a slew of modifications in the exploit to counter the threat.
get the latest hacking gist here

Bleeping Computer today revealed that they discovered a type of “clipboard hijacker” malware that monitors over 2.3 million bitcoin addresses.

A clipboard hijacker malware works by tricking users by switching the bitcoin address from their clipboard to another address that the attacker control. Since bitcoin addresses are long and hard to remember, this method works easily for hackers since users simply copy paste addresses from one application to another when sending cryptocoins.

The malware reportedly comes as a part of the All-Radio 4.27 Portable malware affecting Windows computers and monitors the Windows clipboard for a bitcoin address. Unless the user double-checks the address after pasting it, the bitcoin will go to the attackers’ address.

“While we have covered cryptocurrency clipboard hijackers in the past and they are not new, most of the previous samples monitored for 400-600 thousand cryptocurrency addresses,” their report on the malware read. They also posted a video showing how the malware works: 


Bitcoin users are advised to always double-check the address before making a transaction and to have a trusted antivirus program installed on their device.

get the latest hacking gist here
Insurance Uk started life in 2018 as a six page financial fact-sheet with a revolutionary idea: to bring the best financial products together in a way that allowed for comparison.
Since then much has changed at Insurance Uk, but we are still committed to our founding company values of accuracy and independence.

What we stand for

Insurance Uk is a comparison site; with a difference. We are completely independent, and committed to providing you with the most up-to-the-minute financial information – from our constantly-reviewed:
Best Buy charts
Balanced editorial we write in our news section.
Useful Guides and Money Saving Tips
Depositor Protection Schemes to find out where your bank or building society is licensed, and what deposit protection guarantees you'll get if they go bust.

How we make money


moneyfacts.co.uk is a business. As a business, it's important for us to make money, so that we can continue to provide our site for free use.
However, as a business we also take an ethical approach to the service we offer – this is at the core of what we do.

We show all the products available to you in our product searches, with the better ones appearing in our Best Buy tables. We do not get paid to show any of the products you see on the site (unless in an advert), nor do we receive any payment to include a product in our Best Buys.

Although we don't get paid to include products in our searches or Best Buys, some companies choose to pay us for any clicks, applications or sales they get by inquiring through Insurance Uk.

It's easy to see which products that are in a best buy chart we make money from: wherever you see the “go to site” button that means we get paid either because you click the button, make an application, or buy the product. Some parts of the site show a green "Speak to an adviser" button. From this you can arrange to speak to an adviser, and we will get paid by them if you take an account out following their advice.

When you conduct a product search, your results will default to the products that are “available online”. These are, in other words, the products that have a “Go to Site” button – the products we make money from. You can still apply for other products online that are in our search results (as long as the provider allows this): you just can't do that directly from Insurance Uk.

If you complete a contact or quotation form that is sent to one of our selected third parties, we get paid for supplying them with your business.
We also earn money through companies advertising on our site. We get paid depending upon how many times an advert is shown, or is clicked on by visitors. get the latest hacking gist here

Friday, June 29, 2018

levi moshe sets to drop off his new single next month titled chukwu okike
its a song he prepoares to call full soul stage performance, keep ur fingers crossed and expect  this killer jam as it dops. even though levi moshe is a  gospelartiste he has also got the vibe 
                                   
While the chaos for the infamous Equifax data breach hasn’t ended, here we have another news story about another massive breach. This time, the marketing company ‘Exactis’ unwittingly exposed customers’ data. A researcher found approx. 340 million records from the Exactis data leaked online. Presently, we are not sure whether any hacker(s) had a hand in causing the leak.

Exactis Data Leaked Details Of 340 Million Americans
As disclosed by Wired on Wednesday, marketing firm Exactis exposed a huge chunk of records from its database online. Reportedly, approximately 340 million records from Exactis was leaked on publicly accessible servers. Security researcher, Vinny Troia, discovered the data containing personal information of the users.

According to Vinny Troia, the data included the details of about 230 million American individual users. Whereas, the remaining 110 million records were business data. It is yet unknown how long the data has been available on that public server. The leaked details include names, contact addresses, contact numbers, email addresses, and other personally identifiable information. However, it luckily has no financial details.

Vinny Troia is an independent security researcher and the owner of his cybersecurity firm ‘Night Lion Security’. While talking about the incident to Wired, he said,

“It seems like this is a database with pretty much every US citizen in it. I don’t know where the data is coming from, but it is one of the most comprehensive collections I have ever seen.”

Though it’s yet unknown if the data is in the hands of hackers, Troia says that finding this data online is way easier than one might expect. He himself stumbled upon this chunk as he was scraping ElasticSearch using  ‘Shodan’. According to him, anybody using such scanning software can easily trace such databases.

Exactis Preferred To Stay Quiet
After discovering the data, Vinny Troia informed Exactis and FBI about his discovery. Since then, Exactis has most probably protected the data as it’s no more accessible. However, the firm has given no official statements about the incident.

Yet, several other security analysts have expressed their thoughts regarding the matter.

“The sheer amount of cloud databases left accessible on the internet is astounding, especially when one considers the type and amount of data that users store on it without giving it a second thought,”

says John Robinson, security strategist at Cofense Inc.

Likewise, Marc Rotenberg, Executive Director at the EPIC comments,

“The likelihood of financial fraud is not that great, but the possibility of impersonation or profiling is certainly there.”

As we haven’t heard anything from Exactis regarding the incident, it is yet unknown how did such a large piece of data was leaked publicly, whether it was accidentally placed there by Exactis, or was the result of a hack. Likewise, we aren’t sure if more of such data is available on any other servers. Yet, from what we know by now, the incident appears somewhat similar to the MyHeritage data breach that exposed 92 million records on external servers.

Ticketmaster Data Breach – Customer’s Payment Details May Have Been Leaked

Another hacking incident has put the masses at risk. The recent Ticketmaster data breach affected almost 5% of all its users. The ticketing service confirmed that the breached data might include customer’s payment details as well. (Once again, people lost their sensitive financial information to hackers in a data breach)

Ticketmaster Data Breach Sourced From A Chat Widget

As disclosed by the company on June 23, around 5% of all Ticketmaster UK users were affected in a cyber attack. The hackers may have accessed user data, including payment information. The affectees predominantly include people from the UK.
“UK customers who purchased, or attempted to purchase, tickets between February and June 23, 2018, may be affected as well as international customers who purchased, or attempted to purchase, tickets between September 2017 and June 23, 2018,” state Ticketmaster in their official notice. “Less than 5% of our global customer base has been affected by this incident. Customers in North America have not been affected.”
Reportedly, the hackers exploited their chat widget powered by Inbenta Technologies. After detecting the presence of malware on this third-party product, Ticketmaster disabled Inbenta chat for all its websites. However, they suspect that the unknown hackers may have extracted important customer details by then.
“As a result of Inbenta’s product running on Ticketmaster International websites, some of our customers’ personal or payment information may have been accessed by an unknown third-party. Information which may have been compromised includes name, address, email address, telephone number, payment details and Ticketmaster login details.”

Ticketmaster UK Has Taken Appropriate Security Measures

Ticketmaster informed their customers about the incident via email. They have asked them to update their login credentials and monitor their bank account statuses. They have also sent out emails to affected customers. Those who have not received such emails supposedly remain unaffected by the breach.
They have also began a forensic investigation to get to the bottom of the matter:
“Forensic teams and security experts are working around the clock to understand how the data was compromised. We are working with relevant authorities, as well as credit card companies and banks.”
Yet, they urge their customers to remain careful about their security.
“We recommend that you monitor your account statements for evidence of fraud or identity theft. If you are concerned or notice any suspicious activity on your account, you should contact your bank(s) and any credit card companies.”
As compensation, they are also offering a one-year identity monitoring service to affectees with a leading service provider. The victims of this Ticketmaster data breach living in UK, Australia, New Zealand, France, Germany, Spain, and Ireland can apply for this service by filling out an online form

Vulnerability threat to WordPress core

Top cyber security experts have talked of an impending vulnerability that could put WordPress in a fix and unless the renowned content management system releases a patch to counter it a serious consequences is in the offing. 
In a recent disclosure, the experts claimed to have got wind of the vulnerability in November last year forcing them to write to the WordPress authority and suggested a patch to negate the possibility of a mess in the system. 
But the things refused to progress. Those doing research on it claimed to have found out the bug in question in PHP where images uploaded on the WordPress site is deleted. 
Thus, the attackers could takes the rein of the content management system of the WordPress. 
According to what they say, the cyber criminals can attack the system deploying a malicious code in a WordPress owned site and as a result, the WordPress core containing crucial data and files would be deleted. 
Only the bug could be exploited by the users with the ability to get a post created with images. 
This is what the mechanism to minimise the impact of the vulnerability, say the researchers. 
In doing so, even if somebody attempts to attack registering an user account in a site, he or she could cash in on the vulnerability before hijacking a site.
Hijacking site is not impossible since vulnerability is there for the attackers who would delete the config file of a site. 
Usually, the attackers then would install the file and the site afresh. But this time they would use the database settings of their own. 
The researchers are, more or less, agree that the vulnerability in question would leave the WordPress CMS versions affected along with v4.9.6, the updated WordPress version. 
The WordPress team members are tightlipped on the issue even six months after they received the sets of suggestion to deploy a patch. But they never denied the authenticity of the findings. 
The vulnerability, it is said, has little chance to be exploited in a big way since there is no author level account on a WordPress-owned site. 
The team of researchers has released a hotfix, which indeed, is a PHP code for those who own sites to enable them to add it to the .php file to remain unharmed.

This surveillance van can hack your iPhone or Android device from 500 meters away

A Cyprus-based surveillance startup WiSpear, founded by Israel's surveillance market players Tal Dilian, has built a spy car that is full of 'next-generation snooping' tools which can hack Apple and Android devices from 500 meters  (547 yards) away.

The new vehicle is named SpearHead 360,  and was displayed for the first time at ISS World and Eurosatory trade show.  The car is for sale between  $3.5 million and $5 million.

The SpearHead 360 vehicle has 24 antennas to help it reach out to nearby devices. Once a device has been chosen to be targeted, the automobile has four different kinds of methods to force a device to connect to its Wi-Fi-based interceptors to gather intel from the device.

 It also has four different kinds of malware for various operating systems,  including Apple’s iOS or Google’s Android devices, that could be installed remotely.

According to Dilian,  the van is capable of hacking multiple devices running on the same or different OS, at the same location, all at the same time.

The company claims that they have an access  to a range of publicly-unknown Android and iOS vulnerabilities (known as zero-days) both in Google and Apple Operating systems,  which can be easily used by hackers to target the devices simultaneously; imagine if you have three different devices (a Mac Laptop, an Android phone, and a Windows tablet) with you at a point in time,  and it is in range of spy van, then all three could be infected at once.

"This takes customers from detection all the way to full interception. I think it’s a game changer."-Tal Dilian, founder, WiSpear

Cisco patches critical vulnerabilities

Cisco released patches for 34 vulnerabilities that include 5 critical, 20 high and 9 medium vulnerabilities. The 5 critical vulnerabilities are in FXOS and NX-OS and NX-API software and could allow an attacker to execute remote arbitrary code that could cause a buffer overflow or in other cases may lead to a DoS attack.

You'll need to wade through Cisco's advisories to work out if the software you're running is vulnerable or already fixed.

All of the critical flaws have a CVSS score of 9.8 out of 10 and four of them affect the FXOS and NX-OS Cisco Fabric Services because FXOS/NX-OS "insufficiently validates header values in Cisco Fabric Services packets," according to the security notice. The last critical flaw affects the NX-API feature of NX-OS.

The critical Smart Install flaw has affected 8.5 million devices till now.

The Cisco patch will fix the issues CVE-2018-0308, CVE-2018-0304, CVE-2018-0314 and CVE-2018-0312.

 ▬ MDS 9000 Series Multilayer Switches
▬ Nexus 2000 Series Fabric Extenders
▬ Nexus 3000 Series Switches
▬ Nexus 3500 Platform Switches
▬ Nexus 5500 Platform Switches
▬ Nexus 5600 Platform Switches
▬ Nexus 6000 Series Switches
▬ Nexus 7000 Series Switches
▬ Nexus 7700 Series Switches
▬ Nexus 9000 Series Switches in a standalone NX-OS mode
▬ Nexus 9500 R-Series Line Cards and Fabric Modules
▬ Firepower 4100 Series Next-Generation Firewalls
▬ Firepower 9300 Security Appliance
▬ UCS 6100 Series Fabric Interconnects
▬ UCS 6200 Series Fabric Interconnects
▬ UCS 6300 Series Fabric Interconnects

The NX-API vulnerability is caused by an incorrect input validation in the authentication module of the NX-API subsystem which can be exploited if an attacker were to send a crafted HTTP or HTTPS packet to the management interface of an affected system with the NX-API feature enabled.

The four affecting Cisco Fabric Services are because FXOS/NX-OS "insufficiently validates header values in Cisco Fabric Services packets".
get the latest hacking gist here

Thursday, June 28, 2018

Så här återställer jag mitt Facebook-konto när jag inte längre kan logga in

Så här återställer jag mitt Facebook-konto när jag inte längre kan logga in

Glömde du ditt lösenord och kan du inte logga in längre? Eller var ditt konto hackat?

Du är inte ensam! Hundratals människor vänder sig till oss med liknande frågor varje dag. Lyckligtvis erbjuder Facebook flera automatiska sätt att återvinna ditt konto. Oavsett om du har glömt ditt lösenord eller inte längre kan logga in eftersom en hacker ändrat den, har du flera alternativ. Vi visar dig hur du återställer ditt Facebook-konto, steg för steg.

Obs! Den här artikeln omfattar allt jag vet om återställning av Facebook-konto. Läs den här artikeln, läs kommentarerna, och om du fortfarande har frågor, lämna din egen kommentar och hoppas på det bästa. Det finns inget mer jag vet eller kan göra för att hjälpa

1. Är du fortfarande loggad någonstans?
Innan du försöker återställa ditt konto, kontrollera om du fortfarande är inloggad på Facebook på någon av dina enheter. Det här kan vara en annan webbläsare eller webbläsarprofil på din dator, din Facebook Android eller iOS-app eller en mobilwebbläsare, till exempel på din surfplatta.

Om du kan komma åt Facebook var som helst, fortsätt till steg 1a i vår artikel om vad du ska göra när ditt Facebook-konto har hackats

Obs! Om du ställer in tvåfaktorsautentisering och har tappat åtkomst till din kodgenerator kan du här återställa ditt konto.

2. Har du försökt alternativa alternativ för återställning av konton än?
OK, så du kunde inte hitta en enhet där du fortfarande var inloggad på Facebook. Låt oss fortsätta med återhämtningen då. Om möjligt, använd ett nätverk eller en dator från vilken du har loggat in på ditt Facebook-konto innan.

Först måste du identifiera ditt konto. Gå till Facebook-återställningssidan och använd en e-postadress eller ett telefonnummer som du tidigare lagt till på ditt Facebook-konto. Även om det inte säger så kan du också använda ditt Facebook användarnamn.

Så här återställer du ditt Facebook-konto när du inte längre kan logga in Hitta ett Facebook-konto

När du lyckats identifiera ditt konto lyckades du se en sammanfattning av din profil. Innan du fortsätter, kontrollera noga om det här är ditt konto och om du fortfarande har tillgång till den eller de e-postadresser eller mobiltelefonnummer som anges.

Så här återställer du ditt Facebook-konto när du inte längre kan logga in på Facebook Återställ lösenord

Ska du inte längre ha tillgång till dessa? Fortsätt till punkt 3 i denna artikel.

Om allt ser bra ut med de kontaktuppgifter som Facebook har på filen för dig klickar du på Fortsätt. Facebook skickar dig en säkerhetskod. Hämta det, skriv in det och gläd dig att ha återställt ditt konto.

Så här återställer du ditt Facebook-konto när du inte längre kan logga in i Facebook Säkerhetskod 1

Om koden aldrig kommer fram klickar du på Fick inte en kod?, Som tar dig tillbaka till föregående skärmbild för Återställ ditt lösenord. Du kan försöka igen eller kanske kommer du inse att du inte har tillgång till kontot / s trots allt.

Tillbaka till ditt konto
Om du lyckades få tillgång till ditt konto och om du misstänker att ditt konto hackades ändras omedelbart ditt lösenord (använd ett starkt lösenord!) Och uppdatera din kontaktinformation. Det här är viktiga steg för att säkra ditt Facebook-konto. Var noga med att ta bort eventuella e-postadresser eller telefonnummer som inte är egna eller att du inte längre kan komma åt.

Vi rekommenderar starkt att du aktiverar tvåfaktors autentisering, så detta kommer inte att hända igen.

3. Ändrade din kontaktinformation?
Ofta är det inte möjligt att återställa ett konto med alternativen ovan. Kanske har du inte längre tillgång till den e-postadress (er) och telefonnummer (er) du en gång har lagt till i din profil. Eller kanske en hacker ändrade den här informationen. I så fall tillåter Facebook dig att ange en ny e-postadress, som de kommer att använda för att kontakta dig om att återställa ditt konto.

För att starta processen, klicka på länken Har du inte längre tillgång till dessa? längst ned till vänster på återställ lösenordssidan för att starta återställningsprocessen. Facebook kommer att fråga dig om en ny e-postadress eller ett telefonnummer, så att de kan nå ut till dig om det behövs. Klicka på Fortsätt för att fortsätta.

Så här återställer du ditt Facebook-konto när du inte längre kan logga in på Facebook

Om du har konfigurerat Trusted Contacts får du chansen att använda dessa för att återställa ditt konto i nästa steg.

Så här återställer du ditt Facebook-konto när du inte längre kan logga in på Facebook Trusted Contacts

Du måste komma ihåg minst ett fullständigt namn på dina tre till fem pålitliga kontakter för att avslöja dem alla. Observera att du bara behöver tre koder för att återställa ditt konto.

Om du inte konfigurerat betrodda kontakter kan du få möjlighet att besvara ett av dina säkerhetsfrågor och återställa ditt lösenord på plats. Som en extra försiktighet kommer detta med en 24-timmars väntetid innan du kan komma åt ditt konto.

Annars kanske du måste vänta tills Facebook kommer i kontakt för att verifiera din identitet. Ha tålamod!

4. Var ditt konto hackat och skickar ut spam?
Om ditt konto hackats och skickar spam till
더 이상 로그인 할 수 없을 때 내 Facebook 계정을 복구하는 방법
더 이상 로그인 할 수 없을 때 내 Facebook 계정을 복구하는 방법

비밀번호를 잊어 버렸기 때문에 더 이상 로그인 할 수 없습니까? 또는 귀하의 계정이 해킹 당했습니까?

당신은 혼자가 아닙니다! 수백 명의 사람들이 매일 비슷한 질문을 던져 우리를 찾습니다. 다행히도 Facebook은 귀하의 계정을 되 찾을 수있는 몇 가지 자동화 된 방법을 제공합니다. 해커가 암호를 변경했기 때문에 암호를 잊어 버렸거나 더 이상 로그인 할 수없는 경우 몇 가지 옵션이 있습니다. 단계별로 Facebook 계정을 복구하는 방법을 알려 드리겠습니다.

참고 :이 기사에서는 Facebook 계정 복구에 대해 알고있는 모든 내용을 다룹니다. 이 기사를 읽고 의견을 읽고 질문이 있으면 자신의 의견을 남기고 최선을 다하겠습니다. 내가 아는 것도, 도와 줄 수있는 것도 없습니다.

1. 당신은 아직도 어딘가에 로그인되어 있습니까?
계정을 복구하기 전에 어느 기기에서나 Facebook에 아직 로그인되어 있는지 확인하십시오. 이 정보는 컴퓨터의 다른 브라우저 또는 브라우저 프로필, Facebook Android 또는 iOS 앱 또는 태블릿과 같은 모바일 브라우저 일 수 있습니다.

어디서나 Facebook에 액세스 할 수 있다면 Facebook 계정이 해킹 당했을 때 수행 할 작업에 대한 기사의 1a 단계로 진행하십시오.

참고 : 이중 인증을 설정하고 코드 생성기에 액세스 할 수없는 경우 계정을 복구하는 방법은 다음과 같습니다.

2. 기본 계정 복구 옵션을 사용해 보셨습니까?
좋아, 그럼에도 페이스 북에 로그인 한 기기를 찾지 못했습니다. 그때 복구를 진행합시다. 가능한 경우 이전에 Facebook 계정에 로그인 한 네트워크 또는 컴퓨터를 사용하십시오.

먼저, 귀하의 계정을 식별해야합니다. Facebook 복구 페이지로 이동하여 이전에 Facebook 계정에 추가 한 이메일 주소 또는 전화 번호를 사용하십시오. 그렇게 말하지는 않지만, Facebook 사용자 이름을 사용할 수도 있습니다.

더 이상 로그인 할 수 없을 때 Facebook 계정을 복구하는 방법 Facebook 계정 찾기

계정을 성공적으로 관리하면 프로필 요약이 표시됩니다. 계속 진행하기 전에 이것이 정말로 귀하의 계정인지 여부와 나열된 이메일 주소 또는 휴대 전화 번호에 대한 액세스 권한이 있는지 여부를주의 깊게 확인하십시오.

페이스 북에서 더 이상 로그인 할 수 없을 때 Facebook 계정을 복구하는 방법

너는 더 이상 이것들에 접근 할 수 없어야합니까? 이 기사의 3 번 지점으로 진행하십시오.

그러나 Facebook에있는 연락처 정보가 모두 잘 나타난다면 계속을 클릭하십시오. Facebook에서 보안 코드를 보내드립니다. 그것을 가져 와서 그것을 입력하고, 계정을 복구 한 것을 기뻐하십시오.

더 이상 Facebook 보안 코드 1에 로그인 할 수 없을 때 Facebook 계정을 복구하는 방법

코드가 도착하지 않으면 코드를받지 못 했습니까?를 클릭하면 이전 암호 재설정 화면으로 돌아갑니다. 다시 시도하거나 어쩌면 계정에 액세스 할 수 없다는 것을 알게 될 것입니다.

귀하의 계정으로 돌아 가기
계정에 다시 액세스 할 수 있었고 계정이 해킹 당했다고 의심되는 경우 즉시 비밀번호를 변경하고 (강력한 비밀번호를 사용하십시오!) 연락처 정보를 업데이트하십시오. 이는 Facebook 계정을 보호하는 주요 단계입니다. 자신이 아니거나 더 이상 액세스 할 수없는 이메일 주소 나 전화 번호는 모두 삭제하십시오.

이중 인증을 사용하도록 권장하므로 다시는 발생하지 않습니다.

3. 연락처 정보가 변경 되었습니까?
위 옵션을 사용하여 계정을 복구 할 수없는 경우가 종종 있습니다. 프로필에 한 번 추가 한 이메일 주소 및 전화 번호에 더 이상 액세스 할 수없는 것일 수 있습니다. 또는 해커가이 정보를 변경했을 수도 있습니다. 이 경우 Facebook은 새로운 이메일 주소를 지정할 수 있습니다.이 이메일 주소는 귀하의 계정 복구에 관해 귀하에게 연락하는 데 사용됩니다.

이 프로세스를 시작하려면 더 이상 액세스 할 수없는 링크를 클릭하십시오. 왼쪽 하단의 비밀번호 재설정 페이지에서 복구 프로세스를 시작하십시오. 페이스 북은 새로운 이메일 주소 나 전화 번호를 물어볼 것입니다. 그래서 필요한 경우 연락을 취할 수 있습니다. 계속하려면 계속을 클릭하십시오.

Facebook Reach에 더 이상 로그인 할 수 없을 때 Facebook 계정을 복구하는 방법

신뢰할 수있는 연락처를 설정 한 경우 다음 단계에서이를 사용하여 계정을 복구 할 수 있습니다.

Facebook 신뢰할 수있는 연락처에서 더 이상 로그인 할 수 없을 때 Facebook 계정을 복구하는 방법

3 ~ 5 개의 신뢰할 수있는 연락처 중 하나 이상의 전체 이름을 기억해야합니다. 계정을 복구하는 데 3 개의 코드 만 있으면됩니다.

신뢰할 수있는 연락처를 설정하지 않은 경우 보안 질문 중 하나에 대답하고 그 자리에서 비밀번호를 재설정 할 수있는 옵션이 제공 될 수 있습니다. 추가 예방 조치로 계정에 액세스하려면 24 시간 대기해야합니다.

그렇지 않으면 Facebook이 사용자의 신원을 확인하기 위해 연락 할 때까지 기다려야합니다. 인내심을 가져라!

4. 계정 해킹 및 스팸 메일 발송 중입니까?
계정이 해킹되어 스팸을 게시하는 경우



How to Recover my Facebook Account When i Can No Longer Log In


How to Recover my Facebook Account When i Can No Longer Log In
Did you forget your password and can no longer log in? Or was your account hacked?
You are not alone! Hundreds of people turn to us with similar questions every day. Fortunately, Facebook offers several automated ways to reclaim your account. Whether you forgot your password or can no longer log in because a hacker changed it, you have several options. We’ll show you how to recover your Facebook account, step-by-step.
Note: This article covers everything I know about Facebook account recovery. Read this article, read the comments, and if you still have questions, leave your own comment and hope for the best. There’s nothing more I know or can do to help

1. Are You Still Logged In Somewhere?

Before you try to recover your account, check whether you are still logged into Facebook on any of your devices. This could be another browser or browser profile on your computer, your Facebook Android or iOS app, or a mobile browser, for example on your tablet.
If you can access Facebook anywhere, proceed to step 1a of our article on what to do when your Facebook account got hacked
Note:  If you set up two-factor authentication and have lost access to your Code Generator, here’s how to recover your account.

2. Have You Tried the Default Account Recovery Options Yet?

OK, so you could not find a device where you were still logged into Facebook. Let’s proceed with the recovery then. If possible, use a network or computer from which you’ve logged into your Facebook account before.
First, you need to identify your account. Head to the Facebook recover page and use an email address or phone number you previously added to your Facebook account. Even if it doesn’t say so, you can also use your Facebook username.
How to Recover Your Facebook Account When You Can No Longer Log In Find Facebook Account
Once you successfully managed to identify your account, you will see a summary of your profile. Before you proceed, carefully check whether this really is your account and whether you still have access to the email address(es) or mobile phone number(s) listed.
How to Recover Your Facebook Account When You Can No Longer Log In Facebook Reset Password
Should you No longer have access to these? proceed to point 3 of this article.
If all looks well with the contact details that Facebook has on file for you, however, click Continue. Facebook will send you a security code. Retrieve it, enter it, and rejoice in having recovered your account.
How to Recover Your Facebook Account When You Can No Longer Log In Facebook Security Code 1
If the code never arrives, click Didn’t get a code?, which will take you back to the previous Reset Your Password screen. You can try again or maybe you’ll realize that you don’t have access to the account/s after all.

Back Into Your Account

If you managed to regain access to your account and if you suspect that your account was hacked, immediately change your password (use a strong password!) and update your contact information. These are key steps in securing your Facebook account. Be sure to remove any email addresses or phone numbers that are not your own or that you can no longer access.
We strongly recommend that you enable two-factor authentication, so this won’t happen again.

3. Did Your Contact Information Change?

Often, it’s not possible to recover an account using the options above. Maybe you no longer have access to the email address(es) and phone number(s) you once added to your profile. Or maybe a hacker changed this information. In that case, Facebook allows you to specify a new email address, which they will use to contact you about recovering your account.
To start this process, click the link No longer have access to these? in the bottom left on the reset password page to start the recovery process. Facebook will ask you for a new email address or phone number, so that they can reach out to you if needed. Click Continue to proceed.
How to Recover Your Facebook Account When You Can No Longer Log In Facebook Reach
If you have set up Trusted Contacts, you will have the chance to use these to recover your account in the next step.
How to Recover Your Facebook Account When You Can No Longer Log In Facebook Trusted Contacts
You’ll need to remember at least one full name of your three to five Trusted Contacts to reveal all of them. Note that you only need three codes to recover your account.
If you didn’t set up Trusted Contacts, you might be given the option to answer one of your security questions and reset your password on the spot. As an additional precaution, this comes with a 24 hour waiting period before you can access your account.
Otherwise, you might have to wait until Facebook gets in touch to verify your identity. Be patient!

4. Was Your Account Hacked & Is Sending Out Spam?

In the event that your account was hacked and is posting spam to the walls of your friends while you can no longer access it, you should report your Facebook account as compromised.
How to Recover Your Facebook Account When You Can No Longer Log In Facebook Report Hacked
This will actually start a similar yet different process as the one outlined above. While you will use the same information to identify your account, in the following step you will be able to use either a current or an old Facebook password to recover your account.
How to Recover Your Facebook Account When You Can No Longer Log In Facebook Recover Hacked Account
This is useful in case a hacker changed your password, but it may also come in handy in case you forgot your new password.
Find more security-related tips on the Account Security page in the Facebook Help Center.

5. Still Locked Out of Facebook?

If all of the recovery methods above failed, your last hope is Facebook itself. You can try emailing security@facebookmail.com to explain your situation. They might give you a chance to prove your identity using your passport or driver’s license. This can take several weeks, so practice patience.
Note: If you didn’t use your real name on Facebook, your hopes for recovering your account this way are close to zero.

If All Else Fails, Create a New Facebook Profile

Over the past few years, I have received countless comments and messages from people who weren’t able to recover their accounts. Usually, their contact information was outdated, the recovery codes Facebook provided didn’t work, or the company would never reach out to verify their identity. Facebook is notoriously difficult to get a hold of. This sucks. Unfortunately, I couldn’t help either.
At some point, you just have to move on. As much as it hurts, learn from your mistakes, create a new account, be sure to add several valid contact details, secure your Facebook account, and rebuild your profile.

Monday, June 25, 2018

make your battry last longer Block Ads in All Your Android Apps Without Root or Extra Battery Drain
If you're in the market for a non-root ad-blocker, developer Julian Klode has an app that you'll definitely want to check out. It uses Android's VPN system in a similar manner to alternative apps like NetGuard and AdGuard, but it's got a new twist that should save lots of battery life in the process.
Unlike its competitors, Klode's ad-blocking app works at the DNS level, meaning that it only filters traffic for a brief moment when connections are first made, which is where all of the battery saving comes into play. To top that off, it's completely free and open-source, so it's an instant contender for best no-root ad-blocker.

Requirements

Step 1Install DNS66

The app that will block all ads on your non-rooted device without excess battery drain is called DNS66, and it's available for free on the F-Droid Repository. This site is a trusted home for free and open-source Android apps, so tap the following link from your Android phone or tablet to begin:
From there, scroll down to the Packages section on the page, then tap the link that says "download apk." Next, simply tap the Download complete notification to launch the APK, then press "Install" when prompted.

Popular Posts

Recent Posts

Text Widget