Are you one of the 30 million users hit by Facebookaccess token breach announced two weeks agoHerehow to find out.

Facebook breach saw 15M users& names - contact info accessed, 14Mbios too

  1. Visit this Facebook Help center link while logged in:https://www.facebook.com/help/securitynoticeref=sec.
  2. Scroll down to the section &Is my Facebook account impacted by this security issue&
  3. Here you&ll see a Yes or No answer to whether your account was one of the 30 million users impacted. Those affected will also receive a warning like this atop their News Feed:Herehow to find out if your Facebook was hacked in the breach
  4. If Yes, you&ll be in one of three categories: A. You&re in the 15 million users& whose name plus email and/or phone number was accessed. B. You&re in the 14 million users& who had that data plus account bio data accessed including &username, gender, locale/language, relationship status, religion, hometown, self-reported current city, birthdate, device types used to access Facebook, education, work, the last 10 places they checked into or were tagged in, website, people or Pages they follow, and the 15 most recent searches.& C. You&re in the 1 million users whose access token was stolen but your account was never actually accessed with it. Lucky you.

Herehow to find out if your Facebook was hacked in the breach

So what should you do if you were hacked

  1. You don&t necessarily have to change your Facebook password or credit card info, as thereno evidence that data was accessed in the attack.
  2. Watch out for spam or scam calls, emails or messages as your contact info could have been sold to unscrupulous businesses.
  3. Be on alert for phishing attempts that may try to email you and get you to sign in to one of your online accounts on a fake page that will steal your data. If you get a suspicious email that looks like itfrom Facebook, you can check here to see if itlegitimate.
  4. If you&re in group B who had their bio info accessed, you may want to contact your bank or cell phone provider and add additional security layers such as a pincode. Thatbecause hackers may have enough biographical info to perform social engineering attacks where they pretend to be you and use stolen data to answer security questions and gain access to your accounts so they can spam your friends, steal and sell your social media handles, or port your phone number to their phone to intercept two-factor authentication prompts.
  5. Consider whether Facebook still deserves to host what you share.

Write comment (96 Comments)

Facebook has now detailed what data was scraped and stolen in the breach it revealed two weeks ago. 30 million users, not 50 million as it initially estimated, had their access tokens stolen by hackers.Users can check FacebookHelp Center to find out if their information was accessed, and Facebook will send customized alerts to those impacted detailing what was accessed from their account and what they can do to recover. Itcurrently not clear if all the information accessed was necessarily scraped.

FacebookVP of product managment Guy Rosen told reporters on a press call that &We are cooperating with the FBI on this matter& and that &the FBI have asked us not to discuss who may be behind this attack& as its own investigation is ongoing. Disclosing anything about perpetrator now could cause them to cover tracks.

15 million of the 30 million users had their name plus phone number and/or email accessed. 14 million had that info plus potentially more biographical info accessed, including &username, gender, locale/language, relationship status, religion, hometown, self-reported current city, birthdate, device types used to access Facebook, education, work, the last 10 places they checked into or were tagged in, website, people or Pages they follow, and the 15 most recent searches&. The remaining 1 million users& information wasn&t accessed.

Facebookother apps including Messenger, Messenger Kids, Instagram, WhatsApp, Workplace, and Pages, as well as its features for payments, third-party apps, advertisers, and developers were not accessed. Facebook says that law enforcement has asked it not to discuss evidence regarding who committed the attack as the FBI continues its investigation.

Facebook breach saw 15M users- names contact info stolen, 14M-s bios too

Facebook says the breach started when hackers with some access tokens exploited a combination of three bugs related to its &View As& privacy feature for seeing your profile from the perspective of someone else. This let them gain access to those accounts& friends leading them to steal access tokens 400,000 accounts, and used a different method to then grab tokens from 30 million of their friends.

Unlike most breaches, this one appears to have turned out to be less severe then initially expected. Users seem to already be forgetting about the breach after a short hiccup where they had to log back in to Facebook. Itpossible that that could impact Facebookuser counts slightly in its Q3 earnings report. But unless a truly nefarious use case for the accessed data is revealed, the breach could fade into the noise of non-stop cybersecurity failures across the web, including Google+breach that was covered up and has now prompted the Facebook competitorshut down.

Write comment (98 Comments)
Want to reduce fraud Make a better password, dummy!

Researchers at Indiana University have confirmed that stringent password policies & aside from being really annoying & actually work. The research, led by Ph.D. student Jacob Abbott, IU CIO Daniel Calarco, and professor L. Jean Camp. They published their findings in a paper entitled &Factors Influencing Password Reuse: A Case Study.&

&Our paper shows that passphrase requirements such as a 15-character minimum length deter the vast majority of IU users (99.98 percent) from reusing passwords or passphrases on other sites,& said Abbott. &Other universities with fewer password requirements had reuse rates potentially as high as 40 percent.&

To investigate the impact of policy on password reuse, the study analyzed password policies from 22 different U.S. universities, including their home institution, IU. Next, they extracted sets of emails and passwords from two large data sets that were published online and contained over 1.3 billion email addresses and password combinations. Based on email addresses belonging to a universitydomain, passwords were compiled and compared against a universityofficial password policy.

The findings were clear: Stringent password rules significantly lower a universityrisk of personal data breaches.

In short, requiring longer passwords and creating a truly stringent password policy reduced fraud and password reuse by almost 99%. Further, the researchers found that preventing users from adding their name or username inside passwords italso pretty helpful. Ultimately, having a stringent password policy is far better than have none at all. Ita no-brainer but it could be an important data point for your next tech project.

Write comment (95 Comments)

AI-powered photo management app Zyl is going back to the drawing board with a streamlined, more efficient redesign. The app is now focused on one thing only — resurfacing your old memories.

Taking photos on a smartphone is now a daily habit. But what about looking back at photos you took one year, three years or even eight years ago It can pile up quite quickly. Zyl thinks thereemotional value in those long-forgotten photos.

Before this update, Zyl helped you delete duplicates, create smart photo albums based on multiple criteria and collaborate on photo albums. In other words, it was a utility app.

But when the company started talking with some of their users, they realized that one feature stood out and had more value than the rest.

Applying those AI-powered models to your photo library is a great way to find interesting photos. But nobody was really looking at them.

When you open the app, you get a view of your camera roll with your last photos at the bottom. Therealso a big green button at the bottom. When you tap on it, Zyl creates a satisfying animation and unveils an important photo.

If you took multiple photos to capture this moment, the app stitches together those photos and create a GIF. You can then share this Zyl with a friend or family member.

Zyl is now a nostalgia-powered photo app

But the true magic happens if you try to get another Zyl. You have to wait 24 hours to unlock another photo. The next day, the app sends you a notification when your photo is ready. You can always open the app again and look at your past Zyls in a new tab with your most important photos.

Unlike Timehop or Facebook&On This Day& feature, Zyl doesn&t look at your social media posts and focuses on your camera roll. Zyl isn&t limited to anniversaries either.

Just like before, Zyl respects your privacy and leaves your photos alone. They&re never sent to the companyserver — Zyl uses the same photo database as the native one on your iPhone or Android phone so it doesn&t eat up more storage.

Over time, the app could give you more options by leveraging facial recognition and the intrinsic social graph of your photo library. Maybe you want to see more photos of your brother as his wedding is coming up.

And that notification can be a powerful nudge. I keep opening the app and sharing old photos. Zyl is a good example of the combination of something that you care about combined with an element of surprise.

Zyl is now a nostalgia-powered photo app

Write comment (100 Comments)
Analyst still predicts end of Microsoft's Surface line despite marked growthAnalyst still predicts end of Microsoft's Surface line despite marked growth

Remember that analyst that predicted the bitter end of Microsoft’s Surface line of devices by 2019 way back in October of last year Well, he’s back, and he’s not backing down from his position.

Steve Brazier, CEO of market research firm Canalys, said recently at his company’s Canalys Channels Forum 2018 event, that it still doesn’t make sense for M

Write comment (90 Comments)
Amazon tosses free Echo Dot in with two new Xbox One bundlesAmazon tosses free Echo Dot in with two new Xbox One bundles

Starting this week gamers will be able to use Alexa with their Xbox systems and, to celebrate, their newfound friendship, Amazon will be giving away a brand-new Amazon Echo Dot for free with select Xbox bundles.

The deal is available starting on October 12 and will include the latest version of the Echo Dot (3rd Generation), either a 1TB Xbox One S

Write comment (93 Comments)