SlideShare a Scribd company logo
INSTAGRAM HACKING
TRUTH & MYTHS
DIGITAL TASK FORCE
TM
DIGITAL MAGZINE
DEC -2020
TM
If you received an email from Instagram letting you know that your email address
was changed,you may be able to undo this by using the revert this change option in
that message.If additional information was also changed (example:your password),
and you're unable to change your email address, please report the account to
Instagram.
Under section 43, a simple civil offense where a person without permission of the
owner accesses the computer and extracts any data or damages the data contained
therein will come under civil liability.The hacker shall be liable to pay a fine to the
affected party. Under the Information Technology Act, 2000, the maximum cap for
compensation was fine at INR 1 crore.However in the amendment made in 2008,this
ceiling wasremoved.
WAYSTOSECUREYOURACCOUNT
1. To have a strong password is a crucial and basic step to secure one's account.
However, just having a strong password isn't sufficient, one needs a few additional
steps to ensure the security of the account.Two-factor authentication is an effective
measure which requires one to enter a code or typically an OTP (One Time
Password)theyregistered tothe respective account.
2. Keep a look at the login activity of the account and including the devices which
were logged into.
3.Stay updated about emails received in relation to your accounts,if any change can
be seen which is not done by you or under your observation one should report it
immediately.
4.Minimise your platform from complexity as the site becomes complex it is hard to
secure it.
5. One must enable a security framework that involves improving skill sets,
developing and enforcing policies, monitoring, enforcement of periodic
assessment.
6. Have a third party review your online posture, conduct. Many complexities and
infiltrations are preventable by mere steps that include multi factor authentication,
network segmentation andend point protection.
7. Major system hacks are both simple and complex; develop explicit procedures
addressing practicesaround everything from e-mail tosocial media.
INSTAGRAM – HACKING AND
PREVENTION TIPS
TM
1. Adopt a social media security solution that includes user authentication and
access management for social media platforms andapplications.
2.Work with your IT department to identify groups or users within your directory
services infrastructure who should have accesstoyour social accounts.
3. Map the employees and partners to the applications to which they should have
access.Create and apply those profiles and mappings in your social media security
tool (e.g.,social response teamcanaccesslistening andpublishing tools).
4.Don't give out direct access to your social media accounts and applications.If you
have in the past,rescind access andnotify your employees andpartners.
5.Make sure your employees know not to share their credentials and why.Education
isacornerstone of good securitypractice.
STEPSTOPREVENT A PHISINGATTACK
1. Limit the number of administrators and applications that have authorized access
to your social media accounts. This helps minimize your attack surface. Use a
password management solution,to ensure your employees and partners don't have
the root credentials toyour socialmedia accounts andapplications.
2. Educate your account administrators on phishing attacks that request their login
credentials. Never click on links in these emails or messages. Instead,
administrators should use their web browser to navigate directly to their social
media account.If the account requires a password change or re-authorization,it will
prompt the user on the webpage directly.
3. Ensure your administrators use strong passwords and that they are always
different from their personal or corporate usernames and passwords.If there are too
many passwords to remember, consider using a secure password vault such as
LastPass, Proofpoint, or OneLogin. These tools provide an added verification
benefit;theywill onlyautomaticallyfill in information on legitimate sites.
5TIPSTOPROTECTYOURINSTAGRAM ACCOUNTFROM BEING HACKED:
« Pick aStrong Password
« Turn onTwo-FactorAuthentication
« Make SureYour EmailAccount isSecure
« Revoke Access toSuspiciousThird-PartyApps
« Don'tclick on anyunknown links or images or videos
STEPS TO REDUCEYOUR RISK
OF A SECURITY THREAT, HACK &
EMPLOYEE MISUSE OFYOUR ACCOUNTS
TM
1. Ensure administrators only access your social media
accounts from trusted machines and require them to log out
aftereach session.
2. Ensure administrators always use secure connections (i.e.,
HTTPS) when logging in.
3. Use authorized publishing, listening, and other social
media tools to access your social media accounts. Do not
directly login to social media networks, unless necessary.
When you must login directly, use a trusted and clean
computer.
4. Ensure your administrators use trusted devices to access
your social accounts and that the devices are running up-to
dateanti-malware software.
WHAT TO DO IF YOU OBSERVE FRAUDULENT
ACTIVITIES.
1. If you observe any unusual activates on your account you
should change the password immediately and kick out the
hacker ifany.
2. If your accounts password is changed put it for reset and
then change itthrough your mailaccount.
3. If your password is changed even the contact details are
changed then reportthe accountfor further steps.
WEBSITE SUPPORT TEAM
1. Facebook report a hacked account:
www.facebook.com/hacked
2.Twitter support request:
support.twitter.com/forms/signing
3. Google+ account recovery:
www.google.com/accounts/recovery
4.YouTube hacked account:
support.google.com/youtube/answer/76187?hl=en
5. Instagram hacked accounts:
5 STEPS TO PREVENT TARGETED
BROWSERS AND COOKIE ATTACKS
TM
Option #1:UseInstagram'sNewAccount Recovery Process
« Here'showitworks:
« If you can't access your Instagram account because the password was changed
by a hacker, you can tap the “My login info isn't working” button, which will
prompt you to enter the email address or phone number linked to your account or
the ones used when you signed uptoInstagram.
« Instagram will then send a six-digit code to allow you to regain access to the
account.
Option #2:UseInstagram'sOld Account Recovery System
Step#1:CheckYour Email Account for aMessage from Instagram
Onthe login screen,tapForgotpassword?
#2:VerifyYour Account
« A photo of yourself holding apaperwithahandwrittencode we've provided you.
« The email address or phone number you signed up with and the type of device
you used atthe time of sign up(example:iPhone,Android,iPad,other).
« Once you provide information to help us verify your identity, we'll send you
specific instructions to recover your account at the secure email address you
provided.
INCIDENTSRELATEDTOSOCIALMEDIAHACKING
In India,Delhi reports 50 cases of Instagram hacking per day.Hackers are targeting
those who have a substantial following.These accounts are then being sold to those
looking to exploit the followers and push their products on Instagram that has about
1 billion users. Following are few incidents where Instagram accounts of famous
celebrities were hacked;
Swapnil Joshi:An attempt was made to hack the Instagram account of Swapnil Joshi.
Cautiously the social media management team of Swapnil Joshi bounced back his
account without much damage.Actor Swapnil Joshi has posted a video on Instagram
describing this horrifying experience. He has tried to create awareness about how
they cheat you through a verified account to sneak into your privacy settings.
Swapnil Joshi also clarified that there were repeated attempts to ask for passwords
aswell.
HOW TO PROTECTYOUR INSTAGRAM
ACCOUNT FROM BEING HACKED
TM
To request alogin link:
1. On the login screen, tap Get help signing in (Android) or Forgot password?
(iPhone).
2. Next, choose either your email address or phone number to have the login link
sent toandthen tapNext.
3.Once you receive the login link,followthe on-screen instructions.
« Recover the accountifit'sdeleted
« Reportthe account
To report ahacked account on Instagram:
« OnAndroid:
1.Onthe login screen,tapGethelp signing in belowLog In.
2. Enter your username, email, or phone number, then tap Next. Learn more about
whatyou cando ifyou don'tknowyour username.
3.TapNeed more help? then followthe on-screen instructions.
« Be sure to enter a secure email address that only you can access. Once you've
submitted your request,be on the lookout for an email from Instagram with next
steps.
OniPhone:
1.Onthe login screen,tapForgotpassword?
2.TapNeed more help? belowthe Nextbuttonandfollowthe on-screen instructions.
« Be sure to enter a secure email address that only you can access. Once you've
submitted your request,be on the lookout for an email from Instagram with next
steps.
« Verify your identity
« Once you submit your request, you should receive an auto-response email from
the Security Team at Instagram asking you to help Instagram verify your identity.
You'llbe asked for one or both of the following:
« A photo of yourself holding apaperwithahandwrittencode we've provided you.
« The email address or phone number you signed up with and the type of device
you used atthe time of sign up(example:iPhone,Android,iPad,other).
« Once you provide information to help Instagram verify your identity, we'll send
you specific instructions to recover your account at the secure email address you
provided.
METHODS TO DO RECOVER
YOUR ACCOUNT
TM
Legal action against hackers;
In India the InformationTechnology Act,2000 and the amendments made thereafter
tries toprotecteveryindividualfrom black hathackers.
Section 43 specifies almost every kind of hacking offence from illegal access data
contamination, manipulation, data destruction, network disruption, removal or
alteration of data-to-data theft, illegal concealment of data, etc. Further this section
imposes apenaltyon hacker tocompensate for the damage incurred towardsvictim.
Section 66 of the Act,further punishes the one who dishonestly or fraudulently does
any act referred under section 43 of Act with the punishment for a term of 3Years or
withfine thatmayextendtofive lakh rupees or both.
Therefore, relying on this provision Indian law duly supports the innocent people
againstthe actof hacking.
Now,if the website of any organization is hacked then he should firstly stay calm,as
he is protected by the law of India. Now as an immediate action, he should take the
following steps:
« Take the website offline:as an immediate step the organization shall temporarily
shut down the website,while it is fixed and protected.This step is taken to prevent
further damage tothe clients of the organization.
« Secondly,immediately file a cyber complaint:as an immediate step,file a cyber
complaint in the cyber cell of the district in which the registered office of the
organization is located. If there is no cyber cell in the district, the organization
could also file a complaint online www.cybercrime.gov.in (which also provides
anadvantage of tracking the complaint,which isotherwise not available)
« A cyber complaint is drafted in a very similar way as FIR is drafted.The important
thing to remember is that all necessary details of the crime are mentioned in the
complaint. Further, with the cyber complaint, some copies of documents are
required tobe attached,which are generallynot attachedwhen the FIRisdrafted.
nnn
LEGAL ACTION
INSTAGRAM HACKING
TRUTH & MYTHS
DIGITAL TASK FORCE
TM
DIGITAL MAGZINE
DEC -2020
« Digital Forensic Solutions
« 65 b Certificate & HashValue Calculation
« RBI Cyber Security Audit Compliance
« Drafting of RBI Cyber Security Policies
« Vulnerability Assessment & Penetration Testing
« Cyber Crime Investigation
« Information Security Audits
« Digital Crime & Fraud Investigations
« All types of Detective & Surveillance Services
« Ransomware Removal Services
« Handwriting/ Signature Analysis
« Fingerprint Analysis
« Audio &Video & Social Media Transcript
« Digital Data Destruction
« DataTheft Investigations
« Cyber LabEstablishment
« Information Security Assessment Services
« PCIDSSCompliance
« HIPPA Compliance
« Incident Management Services
« FinancialFraud Investigations
« Crime Scene Investigations
« InsuranceClaimInvestigation
« IT/ITESSecurity ConsultingServices
« Cyber Advocacy
« CorporateTraining&Awareness Programs
GROUP OF COMPANIES
SWADESHI
FILINGS
TM
GLOBAL CYBER CRIME HELPLINE
OUR OFFERINGS
+918149128087
Rohan Nyayadhish
rohan@dtfservice.com www.dtfservice.com
OUR PRESENCE: PUNE | MADHYA PRADESH | SATARA
+919371971010
65 b Certificate

More Related Content

What's hot

Instagram
Instagram Instagram
Instagram
Drew Ammer
 
Ebay
EbayEbay
Introduction of Instagram inc. (power point presentation)
 Introduction of Instagram inc. (power point presentation) Introduction of Instagram inc. (power point presentation)
Introduction of Instagram inc. (power point presentation)
sai guntapelliwar
 
Social Media on Business - Marketing
Social Media on Business - MarketingSocial Media on Business - Marketing
Social Media on Business - Marketing
Anastasia Bishop
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
Ashesh R
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
Bryan Tran
 
Social Media Monitoring: Presentation on Social Media Monitoring: Why and How
Social Media Monitoring: Presentation on Social Media Monitoring: Why and HowSocial Media Monitoring: Presentation on Social Media Monitoring: Why and How
Social Media Monitoring: Presentation on Social Media Monitoring: Why and How
Ahmed Bouzid
 
Impact of social media on business
Impact of social media on businessImpact of social media on business
Impact of social media on business
N V Jagadeesh Kumar
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
Quick Heal Technologies Ltd.
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
Tom Eston
 
An introduction to Twitter
An introduction to TwitterAn introduction to Twitter
An introduction to Twitter
Together Housing Group
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
Parag Deodhar
 
Instagram presentation
Instagram presentation Instagram presentation
Instagram presentation
Gee Ekachai
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
WPICPE
 
Computer safety
Computer safetyComputer safety
Computer safetyahentz
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
Nalneesh Gaur
 
Conclusion: Instagram Marketing
Conclusion: Instagram MarketingConclusion: Instagram Marketing
Conclusion: Instagram Marketing
Myspeedhub
 
Instagram
InstagramInstagram
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 

What's hot (20)

Instagram
Instagram Instagram
Instagram
 
Ebay
EbayEbay
Ebay
 
Introduction of Instagram inc. (power point presentation)
 Introduction of Instagram inc. (power point presentation) Introduction of Instagram inc. (power point presentation)
Introduction of Instagram inc. (power point presentation)
 
Social Media on Business - Marketing
Social Media on Business - MarketingSocial Media on Business - Marketing
Social Media on Business - Marketing
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Social Media Monitoring: Presentation on Social Media Monitoring: Why and How
Social Media Monitoring: Presentation on Social Media Monitoring: Why and HowSocial Media Monitoring: Presentation on Social Media Monitoring: Why and How
Social Media Monitoring: Presentation on Social Media Monitoring: Why and How
 
Impact of social media on business
Impact of social media on businessImpact of social media on business
Impact of social media on business
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
An introduction to Twitter
An introduction to TwitterAn introduction to Twitter
An introduction to Twitter
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Instagram presentation
Instagram presentation Instagram presentation
Instagram presentation
 
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at HomeWebinar - Cyber Hygiene: Stay Clean at Work and at Home
Webinar - Cyber Hygiene: Stay Clean at Work and at Home
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
Conclusion: Instagram Marketing
Conclusion: Instagram MarketingConclusion: Instagram Marketing
Conclusion: Instagram Marketing
 
Instagram
InstagramInstagram
Instagram
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 

Similar to INSTAGRAM – HACKING AND PREVENTION TIPS

Facebook & Instagram Safety Guide
Facebook & Instagram Safety GuideFacebook & Instagram Safety Guide
Facebook & Instagram Safety Guide
Vittorio Pasteris
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
Norfolk Naval Shipyard
 
Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
Joint Base Myer-Henderson Hall
 
How to use microsoft authenticator app
How to use microsoft authenticator appHow to use microsoft authenticator app
How to use microsoft authenticator app
Server Consultancy
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
QuiMo3
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
PiedadCES
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
JohnSimLabayan2
 
Beware of a Voice Message Phishing Scam on WhatsApp.pptx
Beware of a Voice Message Phishing Scam on WhatsApp.pptxBeware of a Voice Message Phishing Scam on WhatsApp.pptx
Beware of a Voice Message Phishing Scam on WhatsApp.pptx
Infosectrain3
 
Beware of a Voice Message Phishing Scam on WhatsApp.pptx
Beware of a Voice Message Phishing Scam on WhatsApp.pptxBeware of a Voice Message Phishing Scam on WhatsApp.pptx
Beware of a Voice Message Phishing Scam on WhatsApp.pptx
infosec train
 
What is Account Takeover - An Introduction to Web Fraud
What is Account Takeover - An Introduction to Web FraudWhat is Account Takeover - An Introduction to Web Fraud
What is Account Takeover - An Introduction to Web Fraud
NuData Security
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
Caroline Johnson
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
Jamie Proctor-Brassard
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
Mohit Kanwar
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Can people hack your Cash App.pdf
Can people hack your Cash App.pdfCan people hack your Cash App.pdf
Can people hack your Cash App.pdf
adelinasmith
 
3 Steps to Stopping Social Media Account Hacks
3 Steps to Stopping Social Media Account Hacks3 Steps to Stopping Social Media Account Hacks
3 Steps to Stopping Social Media Account Hacks
Nexgate
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
CIOWomenMagazine
 
How to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication VulnerabilityHow to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication Vulnerability
AshKhan85
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
Lookout
 

Similar to INSTAGRAM – HACKING AND PREVENTION TIPS (20)

Facebook & Instagram Safety Guide
Facebook & Instagram Safety GuideFacebook & Instagram Safety Guide
Facebook & Instagram Safety Guide
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
 
Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
 
How to use microsoft authenticator app
How to use microsoft authenticator appHow to use microsoft authenticator app
How to use microsoft authenticator app
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptxORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
ORIENTATION ON CYBERSECURITY AND MICROSOFT 365 ADOPTION.pptx
 
Beware of a Voice Message Phishing Scam on WhatsApp.pptx
Beware of a Voice Message Phishing Scam on WhatsApp.pptxBeware of a Voice Message Phishing Scam on WhatsApp.pptx
Beware of a Voice Message Phishing Scam on WhatsApp.pptx
 
Beware of a Voice Message Phishing Scam on WhatsApp.pptx
Beware of a Voice Message Phishing Scam on WhatsApp.pptxBeware of a Voice Message Phishing Scam on WhatsApp.pptx
Beware of a Voice Message Phishing Scam on WhatsApp.pptx
 
What is Account Takeover - An Introduction to Web Fraud
What is Account Takeover - An Introduction to Web FraudWhat is Account Takeover - An Introduction to Web Fraud
What is Account Takeover - An Introduction to Web Fraud
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Can people hack your Cash App.pdf
Can people hack your Cash App.pdfCan people hack your Cash App.pdf
Can people hack your Cash App.pdf
 
3 Steps to Stopping Social Media Account Hacks
3 Steps to Stopping Social Media Account Hacks3 Steps to Stopping Social Media Account Hacks
3 Steps to Stopping Social Media Account Hacks
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
 
How to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication VulnerabilityHow to Find and Fix Broken Authentication Vulnerability
How to Find and Fix Broken Authentication Vulnerability
 
A07010105
A07010105A07010105
A07010105
 
3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account3 Ways to Protect the Data in Your Google Account
3 Ways to Protect the Data in Your Google Account
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

INSTAGRAM – HACKING AND PREVENTION TIPS

  • 1. INSTAGRAM HACKING TRUTH & MYTHS DIGITAL TASK FORCE TM DIGITAL MAGZINE DEC -2020
  • 2. TM If you received an email from Instagram letting you know that your email address was changed,you may be able to undo this by using the revert this change option in that message.If additional information was also changed (example:your password), and you're unable to change your email address, please report the account to Instagram. Under section 43, a simple civil offense where a person without permission of the owner accesses the computer and extracts any data or damages the data contained therein will come under civil liability.The hacker shall be liable to pay a fine to the affected party. Under the Information Technology Act, 2000, the maximum cap for compensation was fine at INR 1 crore.However in the amendment made in 2008,this ceiling wasremoved. WAYSTOSECUREYOURACCOUNT 1. To have a strong password is a crucial and basic step to secure one's account. However, just having a strong password isn't sufficient, one needs a few additional steps to ensure the security of the account.Two-factor authentication is an effective measure which requires one to enter a code or typically an OTP (One Time Password)theyregistered tothe respective account. 2. Keep a look at the login activity of the account and including the devices which were logged into. 3.Stay updated about emails received in relation to your accounts,if any change can be seen which is not done by you or under your observation one should report it immediately. 4.Minimise your platform from complexity as the site becomes complex it is hard to secure it. 5. One must enable a security framework that involves improving skill sets, developing and enforcing policies, monitoring, enforcement of periodic assessment. 6. Have a third party review your online posture, conduct. Many complexities and infiltrations are preventable by mere steps that include multi factor authentication, network segmentation andend point protection. 7. Major system hacks are both simple and complex; develop explicit procedures addressing practicesaround everything from e-mail tosocial media. INSTAGRAM – HACKING AND PREVENTION TIPS
  • 3. TM 1. Adopt a social media security solution that includes user authentication and access management for social media platforms andapplications. 2.Work with your IT department to identify groups or users within your directory services infrastructure who should have accesstoyour social accounts. 3. Map the employees and partners to the applications to which they should have access.Create and apply those profiles and mappings in your social media security tool (e.g.,social response teamcanaccesslistening andpublishing tools). 4.Don't give out direct access to your social media accounts and applications.If you have in the past,rescind access andnotify your employees andpartners. 5.Make sure your employees know not to share their credentials and why.Education isacornerstone of good securitypractice. STEPSTOPREVENT A PHISINGATTACK 1. Limit the number of administrators and applications that have authorized access to your social media accounts. This helps minimize your attack surface. Use a password management solution,to ensure your employees and partners don't have the root credentials toyour socialmedia accounts andapplications. 2. Educate your account administrators on phishing attacks that request their login credentials. Never click on links in these emails or messages. Instead, administrators should use their web browser to navigate directly to their social media account.If the account requires a password change or re-authorization,it will prompt the user on the webpage directly. 3. Ensure your administrators use strong passwords and that they are always different from their personal or corporate usernames and passwords.If there are too many passwords to remember, consider using a secure password vault such as LastPass, Proofpoint, or OneLogin. These tools provide an added verification benefit;theywill onlyautomaticallyfill in information on legitimate sites. 5TIPSTOPROTECTYOURINSTAGRAM ACCOUNTFROM BEING HACKED: « Pick aStrong Password « Turn onTwo-FactorAuthentication « Make SureYour EmailAccount isSecure « Revoke Access toSuspiciousThird-PartyApps « Don'tclick on anyunknown links or images or videos STEPS TO REDUCEYOUR RISK OF A SECURITY THREAT, HACK & EMPLOYEE MISUSE OFYOUR ACCOUNTS
  • 4. TM 1. Ensure administrators only access your social media accounts from trusted machines and require them to log out aftereach session. 2. Ensure administrators always use secure connections (i.e., HTTPS) when logging in. 3. Use authorized publishing, listening, and other social media tools to access your social media accounts. Do not directly login to social media networks, unless necessary. When you must login directly, use a trusted and clean computer. 4. Ensure your administrators use trusted devices to access your social accounts and that the devices are running up-to dateanti-malware software. WHAT TO DO IF YOU OBSERVE FRAUDULENT ACTIVITIES. 1. If you observe any unusual activates on your account you should change the password immediately and kick out the hacker ifany. 2. If your accounts password is changed put it for reset and then change itthrough your mailaccount. 3. If your password is changed even the contact details are changed then reportthe accountfor further steps. WEBSITE SUPPORT TEAM 1. Facebook report a hacked account: www.facebook.com/hacked 2.Twitter support request: support.twitter.com/forms/signing 3. Google+ account recovery: www.google.com/accounts/recovery 4.YouTube hacked account: support.google.com/youtube/answer/76187?hl=en 5. Instagram hacked accounts: 5 STEPS TO PREVENT TARGETED BROWSERS AND COOKIE ATTACKS
  • 5. TM Option #1:UseInstagram'sNewAccount Recovery Process « Here'showitworks: « If you can't access your Instagram account because the password was changed by a hacker, you can tap the “My login info isn't working” button, which will prompt you to enter the email address or phone number linked to your account or the ones used when you signed uptoInstagram. « Instagram will then send a six-digit code to allow you to regain access to the account. Option #2:UseInstagram'sOld Account Recovery System Step#1:CheckYour Email Account for aMessage from Instagram Onthe login screen,tapForgotpassword? #2:VerifyYour Account « A photo of yourself holding apaperwithahandwrittencode we've provided you. « The email address or phone number you signed up with and the type of device you used atthe time of sign up(example:iPhone,Android,iPad,other). « Once you provide information to help us verify your identity, we'll send you specific instructions to recover your account at the secure email address you provided. INCIDENTSRELATEDTOSOCIALMEDIAHACKING In India,Delhi reports 50 cases of Instagram hacking per day.Hackers are targeting those who have a substantial following.These accounts are then being sold to those looking to exploit the followers and push their products on Instagram that has about 1 billion users. Following are few incidents where Instagram accounts of famous celebrities were hacked; Swapnil Joshi:An attempt was made to hack the Instagram account of Swapnil Joshi. Cautiously the social media management team of Swapnil Joshi bounced back his account without much damage.Actor Swapnil Joshi has posted a video on Instagram describing this horrifying experience. He has tried to create awareness about how they cheat you through a verified account to sneak into your privacy settings. Swapnil Joshi also clarified that there were repeated attempts to ask for passwords aswell. HOW TO PROTECTYOUR INSTAGRAM ACCOUNT FROM BEING HACKED
  • 6. TM To request alogin link: 1. On the login screen, tap Get help signing in (Android) or Forgot password? (iPhone). 2. Next, choose either your email address or phone number to have the login link sent toandthen tapNext. 3.Once you receive the login link,followthe on-screen instructions. « Recover the accountifit'sdeleted « Reportthe account To report ahacked account on Instagram: « OnAndroid: 1.Onthe login screen,tapGethelp signing in belowLog In. 2. Enter your username, email, or phone number, then tap Next. Learn more about whatyou cando ifyou don'tknowyour username. 3.TapNeed more help? then followthe on-screen instructions. « Be sure to enter a secure email address that only you can access. Once you've submitted your request,be on the lookout for an email from Instagram with next steps. OniPhone: 1.Onthe login screen,tapForgotpassword? 2.TapNeed more help? belowthe Nextbuttonandfollowthe on-screen instructions. « Be sure to enter a secure email address that only you can access. Once you've submitted your request,be on the lookout for an email from Instagram with next steps. « Verify your identity « Once you submit your request, you should receive an auto-response email from the Security Team at Instagram asking you to help Instagram verify your identity. You'llbe asked for one or both of the following: « A photo of yourself holding apaperwithahandwrittencode we've provided you. « The email address or phone number you signed up with and the type of device you used atthe time of sign up(example:iPhone,Android,iPad,other). « Once you provide information to help Instagram verify your identity, we'll send you specific instructions to recover your account at the secure email address you provided. METHODS TO DO RECOVER YOUR ACCOUNT
  • 7. TM Legal action against hackers; In India the InformationTechnology Act,2000 and the amendments made thereafter tries toprotecteveryindividualfrom black hathackers. Section 43 specifies almost every kind of hacking offence from illegal access data contamination, manipulation, data destruction, network disruption, removal or alteration of data-to-data theft, illegal concealment of data, etc. Further this section imposes apenaltyon hacker tocompensate for the damage incurred towardsvictim. Section 66 of the Act,further punishes the one who dishonestly or fraudulently does any act referred under section 43 of Act with the punishment for a term of 3Years or withfine thatmayextendtofive lakh rupees or both. Therefore, relying on this provision Indian law duly supports the innocent people againstthe actof hacking. Now,if the website of any organization is hacked then he should firstly stay calm,as he is protected by the law of India. Now as an immediate action, he should take the following steps: « Take the website offline:as an immediate step the organization shall temporarily shut down the website,while it is fixed and protected.This step is taken to prevent further damage tothe clients of the organization. « Secondly,immediately file a cyber complaint:as an immediate step,file a cyber complaint in the cyber cell of the district in which the registered office of the organization is located. If there is no cyber cell in the district, the organization could also file a complaint online www.cybercrime.gov.in (which also provides anadvantage of tracking the complaint,which isotherwise not available) « A cyber complaint is drafted in a very similar way as FIR is drafted.The important thing to remember is that all necessary details of the crime are mentioned in the complaint. Further, with the cyber complaint, some copies of documents are required tobe attached,which are generallynot attachedwhen the FIRisdrafted. nnn LEGAL ACTION
  • 8. INSTAGRAM HACKING TRUTH & MYTHS DIGITAL TASK FORCE TM DIGITAL MAGZINE DEC -2020 « Digital Forensic Solutions « 65 b Certificate & HashValue Calculation « RBI Cyber Security Audit Compliance « Drafting of RBI Cyber Security Policies « Vulnerability Assessment & Penetration Testing « Cyber Crime Investigation « Information Security Audits « Digital Crime & Fraud Investigations « All types of Detective & Surveillance Services « Ransomware Removal Services « Handwriting/ Signature Analysis « Fingerprint Analysis « Audio &Video & Social Media Transcript « Digital Data Destruction « DataTheft Investigations « Cyber LabEstablishment « Information Security Assessment Services « PCIDSSCompliance « HIPPA Compliance « Incident Management Services « FinancialFraud Investigations « Crime Scene Investigations « InsuranceClaimInvestigation « IT/ITESSecurity ConsultingServices « Cyber Advocacy « CorporateTraining&Awareness Programs GROUP OF COMPANIES SWADESHI FILINGS TM GLOBAL CYBER CRIME HELPLINE OUR OFFERINGS +918149128087 Rohan Nyayadhish rohan@dtfservice.com www.dtfservice.com OUR PRESENCE: PUNE | MADHYA PRADESH | SATARA +919371971010 65 b Certificate