As Increasing competition in the world to gather likes or comments, people trying different new ways to steal facebook accounts with some malicious application , Those applications are installed in your mobile. and so they get access.
We understand the whole application script that is developed for the browser or smartphones as well, both applications would Websites like apps for mobiles. There are many applications that use Facebook as a database .
Moreover, many applications today run on Facebook. And not only that, but that many of these applications have access to our Facebook account : they can post states, for example, or collect all our information in their databases.
Protecting our Facebook from Malicious applications
The first thing to do, as Facebook says , is not to click on any suspicious link, though this comes from a friend or family nearby. It may be a malicious site and may our Facebook account and therefore our data, are in danger.
Do not allow access to your account data to any page or application. Believe it or not, we run a serious risk to accept that an application has access to our account. So I only do companies that I know very well -and when I’m 100% sure.
If you have already allowed an application to access your Facebook, check the permissions you’ve granted and delete or change them if you consider necessary. To do this you must go to the section on Facebook to check our applications . There must select a per application you have permissions.
No sign in to any site other than Facebook. Estate entirely sure you’re logging into Facebook and if you can not see the URL of the website where you are, do not go, then it is probably a hoax. Also notes that the command http: // navigation bar is green, which is green mean that has gone through a number of certificates that verify that the web is sure.
And finally, although it has nothing to do with malicious applications, we recommend having a password that combine alike -the symbols are permitidos-, -mayúsculas lower-case letters and numbers.
And finally, although it has nothing to do with malicious applications, we recommend having a password that combine alike – , . , ! , @ ; the symbols are lower-case letters and numbers.