{"id":4336,"date":"2019-08-14T14:44:10","date_gmt":"2019-08-14T10:44:10","guid":{"rendered":"https:\/\/nayarweb.com\/blog\/?p=4336"},"modified":"2019-08-14T14:44:38","modified_gmt":"2019-08-14T10:44:38","slug":"5-steps-to-prevent-your-twitter-account-from-being-hacked","status":"publish","type":"post","link":"https:\/\/nayarweb.com\/blog\/2019\/5-steps-to-prevent-your-twitter-account-from-being-hacked\/","title":{"rendered":"5 steps to prevent your Twitter account from being HACKED!"},"content":{"rendered":"<p>When our social media accounts get &#8220;hacked&#8221;, we wonder how is that even possible. Well, most of the cases, the hacks are not really hacks but it was your old self which gave legitimate access to some applications which might be sold to another party or the said developer turned evil.<\/p>\n<p><strong>Step 1: Click on More &gt;&gt; Settings and privacy<\/strong><a href=\"https:\/\/nayarweb.com\/blog\/2019\/5-steps-to-prevent-your-twitter-account-from-being-hacked\/screenshot_20190814_143301\/\" rel=\"attachment wp-att-4337\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4337 alignleft\" src=\"https:\/\/nayarweb.com\/blog\/wp-content\/uploads\/2019\/08\/Screenshot_20190814_143301.png\" alt=\"\" width=\"284\" height=\"636\" srcset=\"https:\/\/nayarweb.com\/blog\/wp-content\/uploads\/2019\/08\/Screenshot_20190814_143301.png 284w, https:\/\/nayarweb.com\/blog\/wp-content\/uploads\/2019\/08\/Screenshot_20190814_143301-134x300.png 134w\" sizes=\"auto, (max-width: 284px) 100vw, 284px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/nayarweb.com\/blog\/2019\/5-steps-to-prevent-your-twitter-account-from-being-hacked\/screenshot_20190814_143326\/\" rel=\"attachment wp-att-4338\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4338 alignright\" src=\"https:\/\/nayarweb.com\/blog\/wp-content\/uploads\/2019\/08\/Screenshot_20190814_143326.png\" alt=\"\" width=\"284\" height=\"636\" srcset=\"https:\/\/nayarweb.com\/blog\/wp-content\/uploads\/2019\/08\/Screenshot_20190814_143326.png 284w, https:\/\/nayarweb.com\/blog\/wp-content\/uploads\/2019\/08\/Screenshot_20190814_143326-134x300.png 134w\" sizes=\"auto, (max-width: 284px) 100vw, 284px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Step 2: Click on Apps and Sessions<\/strong><\/p>\n<p><a href=\"https:\/\/nayarweb.com\/blog\/2019\/5-steps-to-prevent-your-twitter-account-from-being-hacked\/screenshot_20190814_143430\/\" rel=\"attachment wp-att-4339\"><br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4339\" src=\"https:\/\/nayarweb.com\/blog\/wp-content\/uploads\/2019\/08\/Screenshot_20190814_143430.png\" alt=\"\" width=\"653\" height=\"411\" srcset=\"https:\/\/nayarweb.com\/blog\/wp-content\/uploads\/2019\/08\/Screenshot_20190814_143430.png 653w, https:\/\/nayarweb.com\/blog\/wp-content\/uploads\/2019\/08\/Screenshot_20190814_143430-300x189.png 300w\" sizes=\"auto, (max-width: 653px) 100vw, 653px\" \/><\/a><\/p>\n<p>You might be shocked by seeing how many apps might have access to read your feed and even private messages.<\/p>\n<p><strong>Step 3: Click on the apps you no longer want to have access<\/strong><\/p>\n<p><a href=\"https:\/\/nayarweb.com\/blog\/2019\/5-steps-to-prevent-your-twitter-account-from-being-hacked\/screenshot_20190814_143525\/\" rel=\"attachment wp-att-4340\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4340\" src=\"https:\/\/nayarweb.com\/blog\/wp-content\/uploads\/2019\/08\/Screenshot_20190814_143525.png\" alt=\"\" width=\"653\" height=\"486\" srcset=\"https:\/\/nayarweb.com\/blog\/wp-content\/uploads\/2019\/08\/Screenshot_20190814_143525.png 653w, https:\/\/nayarweb.com\/blog\/wp-content\/uploads\/2019\/08\/Screenshot_20190814_143525-300x223.png 300w\" sizes=\"auto, (max-width: 653px) 100vw, 653px\" \/><\/a><\/p>\n<p><strong>Step 4: Revoke Access<\/strong><\/p>\n<p><a href=\"https:\/\/nayarweb.com\/blog\/2019\/5-steps-to-prevent-your-twitter-account-from-being-hacked\/screenshot_20190814_143555\/\" rel=\"attachment wp-att-4341\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4341\" src=\"https:\/\/nayarweb.com\/blog\/wp-content\/uploads\/2019\/08\/Screenshot_20190814_143555.png\" alt=\"\" width=\"653\" height=\"486\" srcset=\"https:\/\/nayarweb.com\/blog\/wp-content\/uploads\/2019\/08\/Screenshot_20190814_143555.png 653w, https:\/\/nayarweb.com\/blog\/wp-content\/uploads\/2019\/08\/Screenshot_20190814_143555-300x223.png 300w\" sizes=\"auto, (max-width: 653px) 100vw, 653px\" \/><\/a><\/p>\n<p><strong>Step 5: Repeat process 3 &amp; 4 until satisfaction.<\/strong><\/p>\n<p>Share this tips with your friends if helpful. Securing your friends account will also secure your privacy from other parties \ud83d\ude09<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When our social media accounts get &#8220;hacked&#8221;, we wonder how is that even possible. Well, most of the cases, the hacks are not really hacks but it was your old self which gave legitimate access to some applications which might be sold to another party or the said developer turned evil. Step 1: Click on &hellip; <a href=\"https:\/\/nayarweb.com\/blog\/2019\/5-steps-to-prevent-your-twitter-account-from-being-hacked\/\" class=\"continue-reading\">Continue reading <span class=\"screen-reader-text\">5 steps to prevent your Twitter account from being HACKED!<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[210],"tags":[204],"class_list":["post-4336","post","type-post","status-publish","format-standard","hentry","category-technology","tag-security"],"_links":{"self":[{"href":"https:\/\/nayarweb.com\/blog\/wp-json\/wp\/v2\/posts\/4336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nayarweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nayarweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nayarweb.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nayarweb.com\/blog\/wp-json\/wp\/v2\/comments?post=4336"}],"version-history":[{"count":3,"href":"https:\/\/nayarweb.com\/blog\/wp-json\/wp\/v2\/posts\/4336\/revisions"}],"predecessor-version":[{"id":4344,"href":"https:\/\/nayarweb.com\/blog\/wp-json\/wp\/v2\/posts\/4336\/revisions\/4344"}],"wp:attachment":[{"href":"https:\/\/nayarweb.com\/blog\/wp-json\/wp\/v2\/media?parent=4336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nayarweb.com\/blog\/wp-json\/wp\/v2\/categories?post=4336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nayarweb.com\/blog\/wp-json\/wp\/v2\/tags?post=4336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}