HomeSecurity OperationsFormerly compromised Twitter user now uses skills for good, assisting in social...

Formerly compromised Twitter user now uses skills for good, assisting in social media account recovery

Published on

spot_img

Victoria Johnson found herself in a precarious situation just hours before her birthday when she inadvertently clicked on a phishing link that locked her out of her Facebook account. With over 7.8k followers and using the platform to manage her online businesses, Johnson was overcome with worry. “I had client orders to process, and worse, I had just sent my bank account details to some of them via Facebook and was about to send them to others!” she shared.

The threat of hacked social media accounts is a prevalent issue, with an estimated 1.4 billion accounts being hacked monthly, as reported by UK cybersecurity firm StationX. The alarming trend is reflected in the search data, with at least 68,000 users seeking help to regain control of their hacked Facebook accounts every month.

In a bid to salvage her finances and business reputation, Johnson sought help from a friend to post a disclaimer on social media. Desperate for a solution, she remembered a user she followed who had previously offered help in recovering hacked accounts. After frantically searching, she found Amama Benn, a digital marketing consultant and ethical hacker, who swiftly leaped into action to assist her.

Amama Benn’s journey into ethical hacking wasn’t deliberate. In 2011, he was a top micro-influencer in Nigeria until his account was hacked, prompting him to delve into cybersecurity to recover his lost followers and reputation. This incident ignited a passion in Benn, leading him to assist others in recovering their hacked accounts on social media platforms.

Since then, Benn has aided numerous individuals in reclaiming their social media and email accounts from hackers. His expertise extends beyond Nigeria, as demonstrated by his recent assistance to a German academic in retrieving a hacked account. While Benn remains discreet about his specific methods, he acknowledged the complexities and challenges he faces in each recovery effort.

Benn receives a continuous influx of distress calls daily, highlighting the prevalence of social media vulnerabilities. He emphasizes the importance of preventative measures to secure accounts, emphasizing the need for tight security measures to safeguard vital transactions stored in inboxes.

Apart from phishing scams, Benn encounters various vulnerabilities, such as the risks associated with selling devices without wiping data. He advises individuals to exercise caution and ensure data is properly wiped before parting with their devices to prevent unauthorized access to accounts.

Simple security measures, such as utilizing strong passwords, implementing screen locks on devices, and avoiding public Wi-Fi networks, can go a long way in enhancing security. Benn urges individuals to remain vigilant and not ignore suspicious login alerts, advising them to change passwords immediately if any unauthorized access is detected.

In conclusion, Amama Benn’s expertise and dedication in assisting individuals in recovering hacked accounts serve as a beacon of hope for many facing similar predicaments. His emphasis on prevention and stringent security measures underscores the importance of safeguarding online assets in an increasingly digital landscape.

Source link

Latest articles

Nexcorium Mirai Variant Exploits TBK DVR Vulnerability in New IoT Botnet Campaign

Nexcorium Malware Variant Emerges, Targeting Unpatched IoT Devices A newly identified variant of Mirai malware,...

DraftKings Hacker Receives Prison Sentence

Sentencing in DraftKings Data Breach: A Cautionary Tale on Cybercrime Kamerin Stokes has recently received...

Microsoft Addresses Two Zero-Day Vulnerabilities in April Patch Tuesday

Microsoft Addresses Vulnerabilities in April Patch Tuesday Update Microsoft has announced an unusually extensive list...

Circle Faces Lawsuit for Stolen USDC

Circle Faces Class Action Suit Over Stolen USDC Response Amid Drift Protocol Hack Circle, a...

More like this

Nexcorium Mirai Variant Exploits TBK DVR Vulnerability in New IoT Botnet Campaign

Nexcorium Malware Variant Emerges, Targeting Unpatched IoT Devices A newly identified variant of Mirai malware,...

DraftKings Hacker Receives Prison Sentence

Sentencing in DraftKings Data Breach: A Cautionary Tale on Cybercrime Kamerin Stokes has recently received...

Microsoft Addresses Two Zero-Day Vulnerabilities in April Patch Tuesday

Microsoft Addresses Vulnerabilities in April Patch Tuesday Update Microsoft has announced an unusually extensive list...