Facebook Thursday announced a new security tool called Trusted Contacts for users who suspect they've been hacked. Facebook Thursday announced a new security tool called “Trusted Contacts” for users who suspect they’ve been hacked.Trusted Contacts allows you to specify three to five Facebook friends to help you regain account access. In case of a security breach, each of these friends gets a code that you must enter to unlock your account. It’s basically an alternative to answering numerous security questions to prove your identity.To recover an account, you’ll need security codes from three contacts, so Facebook recommends choosing friends that are both trustworthy (“like friends you’d give a spare key to your house”) and easy to reach by phone or in person.After setting up Trusted Contacts, each friend will get a notification from Facebook, letting them know that they should be ready to help. Too complicated?It’s a nice gesture but, given that it takes some effort to set up, chances are most users won’t bother unless Facebook starts asking for Trusted Contact details when users log in. In any case, users who are concerned about security would be better served by setting upA Login Approvals, also known as two-factor authentication.This feature prevents access on unrecognized devices by requiring a security code that Facebook sends to your phone. Other companies like Microsoft and Twitter have begun offering two-factor authentication lately, as more users and organizations fall victim to hack attacks.Although Facebook says Trusted Contacts is available now, the link provided doesn’t seem be working yet. You should be able to add Trusted Contacts soon through Facebook’s Security Settings page. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe