It might be that you had too easy a password or your password reset questions were too easy to guess. For example "Tn%^87perNJ" is a good password while using something like your name or an English word without numbers and symbols that can be dictionary attacked is not. Having easily guessable or socially engineer-able reset questions is also a problem. Often times someone has enough information in their Facebook account to answer their 3 questions and reset their password. If the questions are something like in what city were you born, where did you go to high school, your mother's maiden name, or the name of your pet the best strategy is not to answer correctly. So much of that kind of information can be found on message boards people visit or social pages they set up.
This particular breach was the result of phishing. Phishing along with click jacking, malicious scripts, DNS spoofing, having bluetooth enabled on any phone that contains data, packet sniffing through unencrypted WiFi AP's, and ARP poisoning are all ways that people can get passwords and personal information and all are easily avoidable. I could sit in a Starbucks with an open WiFi point and pull packets out of the air all day. If people use these kids of things without taking simple precautions like only entering personal information into SSL encrypted sites or using a VPN for sensitive information they can get their information stolen with very simple to use available equipment.