HomeSecurity OperationsFormerly compromised Twitter user now uses skills for good, assisting in social...

Formerly compromised Twitter user now uses skills for good, assisting in social media account recovery

Published on

spot_img
Formerly compromised Twitter user now uses skills for good, assisting in social media account recovery

Victoria Johnson found herself in a precarious situation just hours before her birthday when she inadvertently clicked on a phishing link that locked her out of her Facebook account. With over 7.8k followers and using the platform to manage her online businesses, Johnson was overcome with worry. “I had client orders to process, and worse, I had just sent my bank account details to some of them via Facebook and was about to send them to others!” she shared.

The threat of hacked social media accounts is a prevalent issue, with an estimated 1.4 billion accounts being hacked monthly, as reported by UK cybersecurity firm StationX. The alarming trend is reflected in the search data, with at least 68,000 users seeking help to regain control of their hacked Facebook accounts every month.

In a bid to salvage her finances and business reputation, Johnson sought help from a friend to post a disclaimer on social media. Desperate for a solution, she remembered a user she followed who had previously offered help in recovering hacked accounts. After frantically searching, she found Amama Benn, a digital marketing consultant and ethical hacker, who swiftly leaped into action to assist her.

Amama Benn’s journey into ethical hacking wasn’t deliberate. In 2011, he was a top micro-influencer in Nigeria until his account was hacked, prompting him to delve into cybersecurity to recover his lost followers and reputation. This incident ignited a passion in Benn, leading him to assist others in recovering their hacked accounts on social media platforms.

Since then, Benn has aided numerous individuals in reclaiming their social media and email accounts from hackers. His expertise extends beyond Nigeria, as demonstrated by his recent assistance to a German academic in retrieving a hacked account. While Benn remains discreet about his specific methods, he acknowledged the complexities and challenges he faces in each recovery effort.

Benn receives a continuous influx of distress calls daily, highlighting the prevalence of social media vulnerabilities. He emphasizes the importance of preventative measures to secure accounts, emphasizing the need for tight security measures to safeguard vital transactions stored in inboxes.

Apart from phishing scams, Benn encounters various vulnerabilities, such as the risks associated with selling devices without wiping data. He advises individuals to exercise caution and ensure data is properly wiped before parting with their devices to prevent unauthorized access to accounts.

Simple security measures, such as utilizing strong passwords, implementing screen locks on devices, and avoiding public Wi-Fi networks, can go a long way in enhancing security. Benn urges individuals to remain vigilant and not ignore suspicious login alerts, advising them to change passwords immediately if any unauthorized access is detected.

In conclusion, Amama Benn’s expertise and dedication in assisting individuals in recovering hacked accounts serve as a beacon of hope for many facing similar predicaments. His emphasis on prevention and stringent security measures underscores the importance of safeguarding online assets in an increasingly digital landscape.

Source link

Latest articles

Bhojon Restaurant Management System 2.7 Vulnerable to Insecure Direct Object Reference

The Bhojon restaurant management system version 2.7 has been found to have an insecure...

North Korean Hackers Aim for Military Advantage by Targeting Critical Infrastructure

The global cybersecurity community has been put on high alert, as the UK, US,...

Learn PenTesting and hacking in this $45 course bundle

The cybersecurity industry is facing a high demand for skilled professionals, but the traditional...

More like this

Bhojon Restaurant Management System 2.7 Vulnerable to Insecure Direct Object Reference

The Bhojon restaurant management system version 2.7 has been found to have an insecure...

North Korean Hackers Aim for Military Advantage by Targeting Critical Infrastructure

The global cybersecurity community has been put on high alert, as the UK, US,...

Learn PenTesting and hacking in this $45 course bundle

The cybersecurity industry is facing a high demand for skilled professionals, but the traditional...
en_USEnglish