SlideShare a Scribd company logo
Social Networks
Hacking , causes and protection

@fahdalharbi13
Outline
•
•
•
•
•

Introduction.
People penetrated.
Tips to protect your account.
Getting started with login verification.
Conclusion.
Introduction

When we talk about hacking and social networks.
Must be referring the last few years appeared a lot
of ways to breakthroughs of social networks .
in the presentation we will discuss about famous
people hacked , What tips to protect ourselves
accounts and how to activate login verification.
People Hacked

• A tweet was sent out from account on Wednesday
to more than 14 million followers

which read: "F*** you B***hes.“
• He then wrote: "Got woke up to find out I got
hacked ! Working on re-following people now
sorryyyyy :( Big loveeee!!“.
Louis Tomlinson November 20, 2013
People Hacked

isco
• the Spanish international player Tweets after the
restoration of his account in which he said: "It is
clear that Tweet published a little while ago, but did
not issue me of a hacker, a greeting to all.“
@fahdalharbi13
2013-11-14
People Hacked

• Academic and writer from Qatar
Tips To Protect Your Account
 Use a strong password.
Do’s:
Create a password at least 10
characters long. Longer is better.

Don’ts:
Use personal information in your
password such as phone numbers,
birthdays, etc.

Use common dictionary words such as
Use a mix of uppercase,
lowercase, numbers, and symbols. “password”, “iloveyou”, etc.

Use a different password for each
website you visit.

Use sequences such as ”abcd1234”,
or keyboard sequences like “qwerty”.

keep your password in
a safe place

Reuse passwords across websites.
Tips To Protect Your Account
 Use login verification.
 Always check that you're at twitter.com before
logging in.
Tips To Protect Your Account
 Keep your computer and browser up-to-date and
virus-free

Assist any compromised friends and followers
Select third-party applications with care.
Getting Started With Login Verification
• Visit your account settings page.
• Select “Require a verification code when I sign in.”
• Click on the link to “add a phone” and follow the prompts.

• After you enroll in login verification, you’ll be asked to enter a
six-digit code that we send to your phone via SMS each time
you sign in to twitter.com
Getting started with login verification
Getting Started With Login Verification
In Saudi Arabia :
- You can send (STOP ,

) to your provider number.
Conclusion
twitter hacking causes and protection

More Related Content

PPTX
PPTX
What can happen if i get hacked
PDF
Session hijacking by rahul tyagi
PDF
Let's talk Security
PPTX
Password Attack
PDF
Cybersafety Checklist for Writers
PPTX
Hacking and privacy threats
PPTX
Introduction to Hacking
What can happen if i get hacked
Session hijacking by rahul tyagi
Let's talk Security
Password Attack
Cybersafety Checklist for Writers
Hacking and privacy threats
Introduction to Hacking

Viewers also liked (20)

PDF
7 Signs that Tell your Computer has been Hacked
PDF
Hackers vs Hackers
PPTX
Unblocking the brain so you can think creatively
PPTX
Hacking
PPTX
How the camera on your cellphone can be captured and used to spy on you
PPTX
Hacking and Anti Hacking
PPTX
Social media privacy
PPTX
PDF
Privacy and Social Media
PDF
How to know you was hacked
PPTX
hacking presentation slide
PPTX
Spies and secret codes gisela palenzuela
PPSX
Ethical Hacking, Its relevance and Its Prospects
PPTX
Protection from hacking attacks
PDF
Hackers and Hacking a brief overview 5-26-2016
PDF
Mobile Hacking
PDF
Wi-fi Hacking
PPT
Blue eye technology
PPTX
Blue brain
PPSX
Hacking
7 Signs that Tell your Computer has been Hacked
Hackers vs Hackers
Unblocking the brain so you can think creatively
Hacking
How the camera on your cellphone can be captured and used to spy on you
Hacking and Anti Hacking
Social media privacy
Privacy and Social Media
How to know you was hacked
hacking presentation slide
Spies and secret codes gisela palenzuela
Ethical Hacking, Its relevance and Its Prospects
Protection from hacking attacks
Hackers and Hacking a brief overview 5-26-2016
Mobile Hacking
Wi-fi Hacking
Blue eye technology
Blue brain
Hacking

Similar to twitter hacking causes and protection (20)

PDF
Be Cyber Smart! (DLH 10/25/2019)
PPTX
Exploring Facebook Workshop at Scotch Plains Public Library
PPT
A quick guide to secure passwords
PDF
15 Security & Privacy Tips for Social Media Safety
PDF
Why is password protection a fallacy a point of view
PPTX
Harry and campbell cyber safety
PPTX
How to Protect Yourself From Heartbleed Security Flaw
PDF
DoD Social Media Guide
PDF
Social Media Safety
PDF
How to choose a password that’s hard to crack
PDF
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media
PPTX
Dos and don's on social media
PPTX
Improving Password Based Security
PPT
Social media security
PPTX
Social Media Risks
PPTX
Scouts-Internet-Safety.pptx
PPTX
Password protection
PDF
‘123456’ worst password of the year 2016
PPTX
How to Create (use use) Strong & Unique Passwords
PDF
Six steps to protect your password from hackers
Be Cyber Smart! (DLH 10/25/2019)
Exploring Facebook Workshop at Scotch Plains Public Library
A quick guide to secure passwords
15 Security & Privacy Tips for Social Media Safety
Why is password protection a fallacy a point of view
Harry and campbell cyber safety
How to Protect Yourself From Heartbleed Security Flaw
DoD Social Media Guide
Social Media Safety
How to choose a password that’s hard to crack
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media
Dos and don's on social media
Improving Password Based Security
Social media security
Social Media Risks
Scouts-Internet-Safety.pptx
Password protection
‘123456’ worst password of the year 2016
How to Create (use use) Strong & Unique Passwords
Six steps to protect your password from hackers

More from Fahd Allebdi (6)

PPTX
ترتيل - جمعية تحفيظ القرآن الكريم بخليص
PDF
Machine learning
PPT
Wireless routers Presentation
PPT
تعليم اللغة الانجليزية
PPS
كنوز من أقوال العلماء
PPTX
Doubly linked list
ترتيل - جمعية تحفيظ القرآن الكريم بخليص
Machine learning
Wireless routers Presentation
تعليم اللغة الانجليزية
كنوز من أقوال العلماء
Doubly linked list

Recently uploaded (20)

PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Complications of Minimal Access Surgery at WLH
PDF
RMMM.pdf make it easy to upload and study
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Cell Types and Its function , kingdom of life
PDF
Yogi Goddess Pres Conference Studio Updates
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Pharma ospi slides which help in ospi learning
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Trump Administration's workforce development strategy
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Complications of Minimal Access Surgery at WLH
RMMM.pdf make it easy to upload and study
VCE English Exam - Section C Student Revision Booklet
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
A systematic review of self-coping strategies used by university students to ...
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Anesthesia in Laparoscopic Surgery in India
Cell Types and Its function , kingdom of life
Yogi Goddess Pres Conference Studio Updates
O5-L3 Freight Transport Ops (International) V1.pdf
Supply Chain Operations Speaking Notes -ICLT Program
Pharma ospi slides which help in ospi learning
2.FourierTransform-ShortQuestionswithAnswers.pdf
Microbial disease of the cardiovascular and lymphatic systems
Chinmaya Tiranga quiz Grand Finale.pdf
Trump Administration's workforce development strategy

twitter hacking causes and protection

  • 1. Social Networks Hacking , causes and protection @fahdalharbi13
  • 2. Outline • • • • • Introduction. People penetrated. Tips to protect your account. Getting started with login verification. Conclusion.
  • 3. Introduction When we talk about hacking and social networks. Must be referring the last few years appeared a lot of ways to breakthroughs of social networks . in the presentation we will discuss about famous people hacked , What tips to protect ourselves accounts and how to activate login verification.
  • 4. People Hacked • A tweet was sent out from account on Wednesday to more than 14 million followers which read: "F*** you B***hes.“ • He then wrote: "Got woke up to find out I got hacked ! Working on re-following people now sorryyyyy :( Big loveeee!!“. Louis Tomlinson November 20, 2013
  • 5. People Hacked isco • the Spanish international player Tweets after the restoration of his account in which he said: "It is clear that Tweet published a little while ago, but did not issue me of a hacker, a greeting to all.“ @fahdalharbi13 2013-11-14
  • 6. People Hacked • Academic and writer from Qatar
  • 7. Tips To Protect Your Account  Use a strong password. Do’s: Create a password at least 10 characters long. Longer is better. Don’ts: Use personal information in your password such as phone numbers, birthdays, etc. Use common dictionary words such as Use a mix of uppercase, lowercase, numbers, and symbols. “password”, “iloveyou”, etc. Use a different password for each website you visit. Use sequences such as ”abcd1234”, or keyboard sequences like “qwerty”. keep your password in a safe place Reuse passwords across websites.
  • 8. Tips To Protect Your Account  Use login verification.  Always check that you're at twitter.com before logging in.
  • 9. Tips To Protect Your Account  Keep your computer and browser up-to-date and virus-free Assist any compromised friends and followers Select third-party applications with care.
  • 10. Getting Started With Login Verification • Visit your account settings page. • Select “Require a verification code when I sign in.” • Click on the link to “add a phone” and follow the prompts. • After you enroll in login verification, you’ll be asked to enter a six-digit code that we send to your phone via SMS each time you sign in to twitter.com
  • 11. Getting started with login verification
  • 12. Getting Started With Login Verification In Saudi Arabia : - You can send (STOP , ) to your provider number.