Sign Up

Sign In

Login to our social questions & Answers Engine to ask questions answer people's questions & connect with other people.

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Captcha Click on image to update the captcha.

You must login to ask question.

Related Posts

Leave a comment

Captcha Click on image to update the captcha.

Latest News & Updates

Over the long weekend reports emerged of an alleged data breach, impacting half a billion Facebook users from 106 countries.

And while this figure is staggering, there’s more to the story than 533 million sets of data. This breach once again highlights how many of the systems we use aren’t designed to adequately protect our information from cyber criminals.

Nor is it always straightforward to figure out whether your data have been compromised in a breach or not.

Breach Explained:

data

More than 500 million Facebook users’ details were published online on an underground website used by cyber criminals.

It quickly became clear this was not a new data breach, but an older one which had come back to haunt Facebook and the millions of users whose data are now available to purchase online.

The data breach is believed to relate to a vulnerability which Facebook reportedly fixed in August of 2019. While the exact source of the data can’t be verified, it was likely acquired through the misuse of legitimate functions in the Facebook systems.

Such misuses can occur when a seemingly innocent feature of a website is used for an unexpected purpose by attackers, as was the case with a PayID attack in 2019.

In the case of Facebook, criminals can mine Facebook’s systems for users’ personal information by using techniques which automate the process of harvesting data.

In the case of Facebook, criminals can mine Facebook’s systems for users’ personal information by using techniques which automate the process of harvesting data.

This may sound familiar. In 2018 Facebook was reeling from the Cambridge Analytica scandal. This too was not a hacking incident, but a misuse of a perfectly legitimate function of the Facebook platform.

If your details were breached ! Were you targeted?:

target

There’s no easy way to determine if your details were breached in the recent leak. If the website concerned is acting in your best interest, you should at least receive a notification. But this isn’t guaranteed.
Even a tech-savvy user would be limited to hunting for the leaked data themselves on underground websites.
The data being sold online contain plenty of key information. According to haveibeenpwned.com, most of the records include names and genders, with many also including dates of birth, location, relationship status and employer.

Although, it has been reported only a small proportion of the stolen data contained a valid email address (about 2.5 million records).

This is important since a user’s data are less valuable without the corresponding email address. It’s the combination of date of birth, name, phone number and email which provides a useful starting point for identity theft and exploitation.

If you’re not sure why these details would be valuable to a criminal, think about how you confirm your identity over the phone with your bank, or how you last reset a password on a website.

Haveibeenpwned.com creator and web security expert Troy Hunt has said a secondary use for the data could be to enhance phishing and SMS-based spam attacks.

How to protect yourself:

Given the nature of the leak, there is very little Facebook users could have done proactively to protect themselves from this breach. As the attack targeted Facebook’s systems, the responsibility for securing the data lies entirely with Facebook.

On an individual level, while you can opt to withdraw from the platform, for many this isn’t a simple option. That said, there are certain changes you can make to your social media behaviours to help reduce your risk from data breaches.

  • Ask yourself if you need to share all your information with Facebook:

There are some bits of information we inevitably have to forfeit in exchange for using Facebook, including mobile numbers for new accounts (as a security measure, ironically). But there are plenty of details you can withhold to retain a modicum of control over your data.

  • Think about what you share:

Apart from the leak being reported, there are plenty of other ways to harvest user data from Facebook. If you use a fake birth date on your account, you should also avoid posting birthday party photos on the real day. Even our seemingly innocent photos can reveal sensitive information.

  • Avoid using Facebook to sign in to other websites:

Although the “sign-in with Facebook” feature is potentially time-saving (and reduces the number of accounts you have to maintain), it also increases potential risk to you — especially if the site you’re signing into isn’t a trusted one. If your Facebook account is compromised, the attacker will have automatic access to all the linked websites.

  • Use unique passwords:

Always use a different password for each online account, even if it is a pain. Installing a password manager will help with this (and this is how I have more than 400 different passwords). While it won’t stop your data from ever being stolen, if your password for a site is leaked it will only work for that one site.

If you really want a scare, you can always download a copy of all the data Facebook has on you. This is useful if you’re considering leaving the platform and want a copy of your data before closing your account.

Download Best WordPress Themes Free Download
Download WordPress Themes Free
Download WordPress Themes Free
Download WordPress Themes Free
lynda course free download
download lava firmware
Premium WordPress Themes Download
download udemy paid course for free

Discy Latest Articles

Do you know about most common error type of programming? And Why it happens?

Do you know about most common error type of programming? And Why it happens?

Experiencing different types of errors in programming is a huge part of the development process. The best developers become comfortable navigating the bugs they create and quickly fixing them. Today, we’re going to talk about the seven most common types ...

Software Testing Market revenue to hit USD 60 Bn by 2026: Global Market Insights, Inc.

Software Testing Market revenue to hit USD 60 Bn by 2026: Global Market Insights, Inc.

According to latest report “Software Testing Market by Component (Application Testing [By Type (Functional and Non-Functional)], Services [Professional and Managed]), Application (IT & Telecom, BFSI, Manufacturing, Retail, Healthcare, Transportation & Logistics, Government & Public), Regional Outlook, Competitive Market Share & ...

It’s time to end America’s longest war: Biden pulls troops out of Afghanistan

It’s time to end America’s longest war: Biden pulls troops out of Afghanistan

US President Joe Biden on Wednesday said that it was time to end America’s longest war in Afghanistan. Biden has decided to withdraw all American troops out of war-torn Afghanistan by September 11 this year.   US President Joe Biden ...

Explore Our Blog