Live
- Woman’s False Claim Sparks Unnecessary Panic
- Locals Report Naxal Activity in Karkala Village
- Mangaluru International Airport Sets New Records in Passenger and Flight Movements
- Where Areca failed, grow Coffee
- Collector Badavath Santosh Reviews Household Survey and Listing Process
- Awareness Session on SHE Team and POCSO Act
- Awareness Program in agricultural College on the Dangers of Drug Abuse for Youth
- 3500-Year-Old Menhir in Kamsanpally Village: A Call for Preservation
- The Role of Artificial Intelligence in Radiology: Transforming Diagnosis and Patient Care
- Hindustan Zinc Ltd. Signs MoU with Rajasthan Government to Invest Rs 36 Crores in Education Development
Just In
Facebook Inc said on Tuesday that investigators have determined that hackers did not access other sites that use the social networking sites single signon in a massive cyberattack that the company disclosed last week
NEW YORK: Facebook Inc said on Tuesday that investigators have determined that hackers did not access other sites that use the social networking site’s single sign-on in a massive cyberattack that the company disclosed last week.
“We analyzed third-party access during the time of the attack we have identified. That investigation has found no evidence that the attackers accessed any apps using Facebook Login,” said Guy Rosen, a Facebook vice president overseeing security, in a statement sent to Reuters.
The announcement comes after Facebook last week disclosed its worst-ever security breach, saying hackers had stolen login codes that allowed them to access nearly 50 million Facebook accounts.
Facebook shares fell for a third day on Tuesday, dropping 1.9 percent to $159.33.
Rosen had warned on a Friday conference call that the hackers could have also accessed third-party websites and apps that allow uses to access their accounts using Facebook logins.
Some security experts, including a former Facebook executive, said the company may have painted a dire, worst-case scenario when it disclosed the attack on Friday to ensure that compliance with strict new European Union privacy rules that took effect in late May.
The EU’s General Data Protection Regulation, or GDPR, imposes steep penalties if companies fail to follow rules that include a requirement that they disclose breaches within 72 hours of discovery. That is a tight window that security experts say does not give investigators adequate time to determine the impact of the breach.
“Interesting impact of the GDPR 72-hour deadline: Companies announcing breaches before investigations are complete,” former senior Facebook Chief Information Security Officer Alex Stamos said in a tweet.
The result is that “everybody is confused on actual impact, lots of rumors,” he tweeted, adding that “a month later, truth is included in official filing.”
The social networking company’s initial warning that the attackers may have accessed external accounts using Facebook Login was alarming because more than 42,000 websites use the service, according to estimates from researchers with the University of Illinois at Chicago.
The warnings prompted some sites to launch their own investigations amid concern the attack could reverberate across the internet.
UK-based travel site SkyScanner and IKEA Group’s TaskRabbit, which provides home repairs and furniture assembly, said they would probe the potential impact on their customers.
Ride-hailing service Uber Technologies Inc [UBER.UL] said it has closed active sessions using Facebook login credentials as it investigated the matter.
© 2024 Hyderabad Media House Limited/The Hans India. All rights reserved. Powered by hocalwire.com