Skip to main content

Forensic Science for Healthcare Professionals

How to prevent your Instagram?

By,
Dr. Bhoopesh Kumar Sharma
Forensic Expert


We are living in the age digital era where everything is so easy and exciting at every moment. We have never thought of a life like this a decade or two back. We all enjoy sharing our best pics, experiences with the world just in one click. Many of us have an urge to become as famous as possible or at least people should know us for our work. Hence, social media is the best tool for this.

Instagram Hacking


Instagram is one of the most popular social media platforms after Facebook, especially among adolescents and early adults who created a profession out of it. For some reason, like forgetting your login password, checking what your child did on Facebook, or seeing if your wife deceived you, etc., you might need to hack your own Instagram account or someone else's. But let me warn you forensically that "IT IS A CRIME". Hacking is of course a crime. 

Nowadays, with the increase in the technical knowledge, availability of facilities, internet, the feasibility of the tools and devices, a perpetrator can easily breach into your social media account. Below are some of the common techniques used by hackers: 

By Using Forgot Password Feature of Instagram

If someone get hold of the Instagram account holder’s email id and password, this is the simplest method ever. The hackers usually follows the steps below to breech into the account:
1. He/She Downloads the Instagram on your phone and tap on Add Account on the Login page.
2. Then he enters the username and clicks on Forgot your login details? Get help signing in. Then he clicks on Use Username or Email from the options, and he has your phone/tablet with him; he will select the Send an SMS option.
3. He will then receive a code, and will use it to reset the password and enter the user’s account with a successful hack.

Using Instagram Trackers

There are number of softwares either freely available on internet or on purchase ( I would not like to name any for security purpose). In this method the hacker will simply visit the official tracker website to sign-up and verify email address. The website directs him to the control panel, which will guide him to install the app on the other person’s phone. Then he need to be sneaky to install that on any desired device, and will login into the website and can track the person’s activity on his dashboard. How cool is this :). But please do not try any such things!
Instagram Tracker

Using the Spy Key-loggers (softwares)

To name a few (I m not promoting any criminal activity through this, it is just for prevention and knowledge) "ikeyMonitor", "Arroapp," "Flexispy," etc. Again I am warning that I have never used such tools; it is only the details collected from different sources. These are usually the tools used to hack the passwords. The perpetrator will easily login to these websites and will download app on your device to get the password. Thing to remember, such things only works on jailbroken devices, resold devices.

There are many other ways, in which such activities can be committed. Our attention, in this article is 'How to Prevent Instagram Hacking'. So, let us discuss here the prevention parameters on a broader sense to help the society as a whole:

Your Password is the Key to Protection: 

Using a strong password is always difficult for the perpetrators and the softwares to hack. It is always recommended to use a “combination of at least six numbers, letters, and punctuation marks,” most security experts suggest a minimum password length of 8 characters. Also, You should also periodically change your passwords — according to most experts, at least once or twice a year. You might even want to use a password manager to monitor your passwords and manage them.

Your Two Factor Authentication:

Almost all major applications now offer some form of two-factor authentication (or 2FA), including Instagram. With two-factor authentication turned on, you will be prompted to enter a SMS security code together with your username and password if you log into Instagram from an unrecognized device. This can help prevent hackers from trying to log into your account and change your contact information.

Secure Your Email Accounts:

Your email is a bit like a key to your online accounts — if someone has access to it, they've got access to almost everything else you've used your email for. So make sure it's safe! Most email providers have systems in place to block undesirable login attempts and provide security measures such as email encryption and authentication of two factors.

Follow Your Own Security Tips"

1. Use Instagram’s New Account Recovery Process
2. Check Your Email Account for a Message From Instagram
3. Log out of Instagram if you are on a shared device
4. Change your passwords frequently
5. Do not open unknown links 
6. Do not open attachments from unknown sources
7. Use an anti-virus software, whenever possible
8. Use different passwords for different accounts
I hope, these simple tips will keep you away from the malicious offenders. Good Luck! and enjoy your social platform.

Comments

  1. This is one of the best content for this topic and this is very useful for me. Thank you!
    Unix Training in Chennai
    Linux Training in Chennai
    Linux Course in Chennai

    ReplyDelete

Post a Comment

Popular posts from this blog

Crime Scene Search Methods

The Crime Scene is search for the physical evidences (visible or invisible). There are various types of search methods employed by the investigating officers and the forensic scientists at the scene of crime. The searching methods mainly depends on: Type of Crime (Rape, murder, burglary, theft, etc.) Nature of Crime (Homicide, suicide, or accident) Size of the crime scene (macroscopic or microscopic) Location of the crime scene (indoor, outdoor, combination of indoor or outdoor, or any remote area like underwater, desert, etc.) Complexity of the crime scene  Before deciding the search method, all the investigators and the forensic experts must follow the general guidelines (check list) to observe the crime scene after due recording: 1. Are the doors and windows locked or unlocked? Open or shut?  2. Are there signs of forced entry, such as tool marks or broken locks? 3. Is the house or the crime scene is in good order? If not, do

Introduction to Forensic Ballistics

By Dr. Bhoopesh Kumar Sharma Forensic Expert & Associate Professor Introduction to Ballistics: The term ballistics refers to the science of study of the action, motion and  behaviour  of a projectile during its flight in any given medium. The flight path of a bullet includes:  • Travel down the barrel  (Internal Ballistics), • Path through the air  (External Ballistics),  and  • Path through a target  (Terminal Ballistics) Forensic Ballistics: Is that branch of forensic science which deals with the examination of the firearm and related evidences encountered at the scene of crime in a shooting incident, and their linkage to the firearm, and Identification of the shooter. A ballistic expert need to answer the following questions: 1. Type of The Firearms used 2. Identification of the Firearm 3. Individual Characteristics of Firearm 4. Range of Firing 5. Direction of Firing 6. Identification of the Shooter 7. Medico legal aspects: - Suic

Blood Spatter Analysis

What is Blood Spatter Analysis? Blood Spatter Analysis or Blood Pattern Analysis (BPA) is the examination of bloodstain shapes, locations, and distribution patterns, to provide an interpretation of the physical events that gave rise to their origin. In forensic investigations, it is ubiquitous to encounter blood on the crime scene. This blood can be in the form of a pool, dried stains, spatter, expirated blood, etc. Hence, the investigators are required to understand these bloodstains to interpret the events that have occurred on the crime scene, to create a possible hypothesis of the modus operandi, to identify the type of weapon, the direction of the blow, severity of the injury, applicable forces, etc. This whole interpretation is known as Blood Pattern Analysis or Blood Spatter Analysis. What are the Types of Blood Patterns? There are many classifications given by blood spatter analyst around the world. I will be using the most common here, to make it understand in