Facebook Hack: Facebook he revealed on September 28 2018 that hackers managed to exploit a vulnerability on the website, which allowed them to obtain tokens from 50 million user accounts.
Facebook's analysis continues to take place, and other elements may emerge later. However, the company reportedly reacted relatively quickly and returned the access identifiers to the affected accounts (approximately 50 million) but also to the other 40 million accounts used by View As recently.
Researchers have not yet determined whether they have leaked additional information from these accounts but are planning to inform the public as soon as they have more information.
Facebook Hack What can you do?
Invaders were able to gain access only to token access. So changing passwords is optional, as attackers have never been able to get them.
Instead, resetting access token blocks access to your Facebook account.
In order not to panic, Facebook users affected by the above issue will receive one on their next connection.
However, there are still a few things you can do:
1. Check the latest links
From address https://www.facebook.com/settings?tab=security§ion=sessions&view Check the devices and geographical location listed in the "Where are you connected to" section.
Make sure you only see devices and locations that match your activity. If you suspect a link:
Click the three dots to the right of the link and select Disconnect from the menu.
If you want a fresh start, select "Disconnect all sessions" to block any device out there.
Facebook supports the following options for a safer account:
Use two-factor authentication. Sign in with a password from your phone and your password
See a list of devices that do not need to use a login code
Additional security settings
Enable alerts for unrecognized connections The service will tell you if someone is connected by a device or a browser you do not usually use
You should also be very careful about the emails or phone calls you receive if you see any suspicious activity in your account. If the attackers managed to get your email, the phone you registered on the social network or other personal information can use them for phishing and social engineering attacks.