Home » today » Technology » Big danger on Twitter and Instagram! They take over your account without the need for a password

Big danger on Twitter and Instagram! They take over your account without the need for a password

Recently, many users have started to report suspicious transactions, especially on Twitter and Instagram. Among the suspicious transactions reported by users are the posts that are liked the most, but the rapid increase in the number of people they follow.

An average social media user, who notices these suspicious transactions, first examines their account activities to see if their account is logged in from another device. However, many users do not understand how the transactions in their accounts are made, since account movements are not logged from another device. Because you don’t need a password to like a post, make a new post, follow someone or unfollow them. For this reason, extra security measures such as two-step verification are meaningless.

THOUSANDS OF SOCIAL MEDIA ACCOUNTS AT RISK DUE TO MALWARE THIRD PARTY APPLICATIONS

No matter how much you increase the security measures on your account. If you unconsciously connect third-party applications to your account, you open a backdoor to cyber attackers.

Backdoor, known in English as Backdoor, is an often undetected method that bypasses the normal security or encryption of computer systems. In this way, accounts become vulnerable to unauthorized access and transactions. If you go to great lengths to protect your social media account but ignore your third-party apps, that means locking the front door and leaving the windows open for hackers.

WHAT IS A THIRD PARTY APPLICATION?

A third-party app is anything you allow to connect to, access or collect data from your social media accounts. These can also be other social media accounts. For example, you may have linked Twitter to your Instagram account so that an Instagram post is automatically shared on Twitter.

Also the tools that scrape your data and tell you that people have stopped following you or give you an analysis of your followers are third party app. Likewise, mobile games connected with your Facebook account are among the third-party applications.

Third-party applications, whose main purpose is to provide convenience to users of social media accounts, unfortunately started to be an attack method used by cybercriminals.

MOST SOCIAL MEDIA USERS ARE NOT AWARE OF THE AUTHORITY GIVEN TO THIRD-PARTY APPS

Unfortunately, most users are unaware of how many third-party apps they give access to in a year. Moreover, despite warnings about what data a website or program can access, these warnings are ignored by users.

Especially if your social media accounts are managed by more than one person, you should regularly audit your channels and check the applications you have given access to frequently. If you’ve never looked at the apps linked to your accounts, you can check your third-party apps by following the steps below.

HOW DO I DISCONNECT THIRD-PARTY APPS?

Especially by thousands of users in order to increase the number of followers or to determine who unfollowed. on Twitter and Instagram third-party applications are used very often. But the vast majority of such apps are malware. For this reason, posts are liked on your behalf or other people are followed. Thus, you unwittingly serve the sites that claim to sell organic followers.

If you have encountered a similar problem, you can follow the steps below for your social media account.

Facebook

  1. After logging into your Facebook account on the desktop, click on your profile photo in the upper right corner.
  2. Then select ‘Settings & Privacy’ in the popup window
  3. Click on ‘Settings’ in the next window
  4. Select ‘Security and Login’ on the left side of the redirected page.
  5. The last one is on the left Apps and Websites You can manage all third-party applications from the section.

In some cases, if you do not want to completely revoke access, you can also edit the permissions given in this section.

Instagram

  1. Click on your tiny profile photo in the lower right corner of the mobile application.
  2. Then click on the “hamburger” icon with three lines on the top right of your profile and enter ‘Settings’.
  3. You can manage all your third-party applications by entering the ‘Applications and Websites’ section in the window that opens.

On the desktop, after logging into Instagram, click on your small profile picture in the upper right and enter the settings in the menu that opens. You can view your third-party applications from the ‘Applications and Websites’ section on the left side of the page that opens later.

Twitter

  1. On the desktop, click the ‘More’ link on the left.
  2. In the menu that opens, go to ‘Settings and Privacy’.
  3. On the page that opens, select ‘Security and account access’ and then ‘Applications and sessions’ in the right-hand section.
  4. After entering the ‘Connected apps’ section at the latest, you can view all your third-party apps.

In the mobile application;

  1. Click on your tiny profile photo at the top left and select ‘Settings and privacy’. Then follow these steps in order:
  2. Security and account access
  3. Applications and sessions
  4. Connected apps

LinkedIn

Click on your thumbnail profile picture in the top left of the mobile app.

  1. Enter ‘Settings’ in the drop-down menu.
  2. Click on ‘Data privacy’ on the page that opens.
  3. Finally, you can see all your third-party applications in the ‘Allowed services’ section at the bottom.

On the desktop, after clicking on your tiny profile photo at the top, clicking on ‘Settings and Privacy’ and following the next 2 steps to the relevant setting you can reach.

YouTube

  1. Click on your profile photo in the top right on both mobile and desktop
  2. Then click on ‘Settings’.
  3. You can manage all third-party applications by clicking ‘Connected Applications’ on the page that opens.

SOURCE: NEWS7

news-author">

Mustafa Cokyasar
Haber7.com – Technology Editor

news-author-image"> News 7 - Mustafa Çokyaşar

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.