my password for FB was changed today with out my permission, FB tells me the time it was changed but i would like to know the device used or person that changed it.
by
retagged by

Your answer

Your name to display (optional):
Privacy: Your email address will only be used for sending these notifications.
Anti-spam verification:
To avoid this verification in future, please log in or register.

1 Answer

The only ones who might be able to help would be Facebook suppport.

If you can get access to your account, change the password again as well as the all of the security confirmation data, as well as temporarily "borrowing" someone else's cell phone number - perhaps that of a trustworthy family member, so that the culprit will not be able to access it again. Be sure to also change the email address for things like password resets to a different mail address.

You will want to make sure your machine is clean of malware and that the perp didn't get your info by spying on you with something like a keylogger, so before you update the account and change passwords and stuff, do the following:

The most reliable way of removing malware: by [email protected]

The best way to remove viruses from your computer is to boot from something other that your hard

disk. Fortunately, most AV producers provide what is called a Rescue Disk. This is a boot-able CD/DVD or flash drive. On a *clean* computer, download at least one of these programs, preferably two of them. (No AV program gets everything but not many can get past two reputable scanners.) Make the boot-able disk or flash drive, boot the computer with it. Now this image was made a while ago so you will want to update after you boot. Once it has updated set it to work scanning your computer. See the explanation of why this is the case below.

Separate from the others I will offer to you is Kaspersky's TDSSKiller. Not an actual Rescue Disk by itself, it is at the very top of the list of root-kit finders/eliminators. You should run this in addition to at least one of the others:

http://usa.kaspersky.com/downloads/TDSSKiller

Here are 4 of the many free Rescue Disks available:
http://support.kaspersky.com/us/viruses/rescuedisk/
http://www.bitdefender.com/support/how-to-create-a-bitdefender-rescue-cd-627.html
https://www.zonealarm.com/forums/showthread.php/72117-boot-disc-zone-alarm-scan
http://www.lavasoft.com/mylavasoft/support/supportcenter/how-to-create-a-rescue-cd

One of the most difficult things about viruses is once you get one it is difficult to be sure you got rid of all of it/them. Resident programs are pretty effective at blocking initial infection if kept updated, but not so good at removing all of the viruses, especially the worst ones – root-kits.

Think of the entire computer with all the software as a walled city with one outer wall – the rest of the world outside, the computer and the software inside – and then a series of inner walls with fewer and fewer people allowed within the next layer towards the castle in the middle. It is the center wall within which all the power of the kingdom resides. On a computer, in the middle, we have the kernel or heart of the operating system which talks directly with the hardware such as the CPU, motherboard, RAM, etc. Anything that wants to access any of the computer's hardware must go through the OS to get there. In the layers going out, each layer has increasingly less security to go through (and less authority) so that on the very outside where the applications are, there isn't a lot of security or authority to change things on the computer.

Most viruses operate in the outer layers which makes it relatively simple to find, identify and remove. Malware performs various tricks in order to get access to the inner layers. There are, however, some viruses which manage to get access to the kernel level. These are called “Root Kit” viruses. Root is a reference to the center layer. In the Linux and Unix world, a root user has the keys to the kingdom and full control of everything on the machine. With Windows, of course, we don't have a root, we have administrators who actually have a little less authority than Root on Linux/Unix.

The Root-Kits are able to get themselves launched at the same time as the kernel, sometimes as part of the kernel. This happens well before any security software on the machine is launched. As a result, these root-kits have time to hide themselves and even hide other viruses from the security systems/software of the computer. The only reliable way to find them is to perform a virus search before the virus launches which means before the Kernel of the OS launches. By using something other than your hard drive to boot from you have full access to everything on the machine and nothing has time to hide because they never launch.

by (33.7k points)

Welcome to Tech Support Questions, where you can ask questions and receive answers from other members of the community.

Post questions regarding any technology problem including problems with phones and tablets, computers and laptops, windows and apple devices and more. Help other members of the community by answering questions.

Note: Please do not post private information such as passwords or usernames.

5,769 questions
2,928 answers
141 comments
31,545 users