Cybercriminals are actively engaged in the use of security holes in social networks.Facebook suffers from multiple disabilities. At the same time, developers face a constant challenge to innovate and improve the quality of the service users, attackers work each day and explore Web sites to find vulnerabilities.
Recently, researchers in the field of information security at Indiana University found a security hole in Facebook, which allows attackers to access confidential information without permission. Vulnerability associated with the code platform Facebook, which allows other websites to have access to basic information about the members of Facebook. For example, researchers have found that Facebook provides access to information based on bing.com each member of Facebook, such as name, gender and other personal data. Several other sites have additional permissions to send messages on behalf of consumers. Attackers can create bogus websites to other websites that have permission to access user information. Once you have access to your user account using forged permits you to retrieve personal information of users or publish false and defamatory messages on behalf of a legitimate user. In the stolen information can be used to create fake profiles on social media, friends of the theft of user identity as a member of Facebook. Thus, vulnerability is information security threat to users. You can also place a malicious link to the bill.
Information Security Professional Facebook reduced security problem. Typically, developers use ethical hacking to identify security holes. In this case, the vulnerability is identified Wang and Zhou Li Rui. Developers and suppliers to encourage scientists to identify vulnerabilities in web sites, web applications and security products that corrective action can be taken for exploitation by criminals.
Users should change their privacy settings to allow only legal parents and friends to access personal information. The developers of social networks for data security, integrity and confidentiality of prolonged use of an innovative platform for social interaction and communication.
[Security] (Link: # http://iclass.eccouncil.org/index.php?option=com_content&view=article&id=69&Itemid=102 Register)
Recently, researchers in the field of information security at Indiana University found a security hole in Facebook, which allows attackers to access confidential information without permission. Vulnerability associated with the code platform Facebook, which allows other websites to have access to basic information about the members of Facebook. For example, researchers have found that Facebook provides access to information based on bing.com each member of Facebook, such as name, gender and other personal data. Several other sites have additional permissions to send messages on behalf of consumers. Attackers can create bogus websites to other websites that have permission to access user information. Once you have access to your user account using forged permits you to retrieve personal information of users or publish false and defamatory messages on behalf of a legitimate user. In the stolen information can be used to create fake profiles on social media, friends of the theft of user identity as a member of Facebook. Thus, vulnerability is information security threat to users. You can also place a malicious link to the bill.
Information Security Professional Facebook reduced security problem. Typically, developers use ethical hacking to identify security holes. In this case, the vulnerability is identified Wang and Zhou Li Rui. Developers and suppliers to encourage scientists to identify vulnerabilities in web sites, web applications and security products that corrective action can be taken for exploitation by criminals.
Users should change their privacy settings to allow only legal parents and friends to access personal information. The developers of social networks for data security, integrity and confidentiality of prolonged use of an innovative platform for social interaction and communication.
[Security] (Link: # http://iclass.eccouncil.org/index.php?option=com_content&view=article&id=69&Itemid=102 Register)
No comments:
Post a Comment