Security

Facebook will force at-risk users to use two-factor authentication

As part of its Protect program

Published

on

Compromised accounts are now a part of our daily lives. Every week, more and more of our personal accounts get involved in potential attacks. As such, several platforms always encourage us to change our passwords especially when the account is involved in a massive breach. Now, with more security options available to us, sites can encourage us to do much more. Reflecting this, Facebook will soon force potentially compromised accounts to implement two-factor authentication.

The platform’s Protect program detects individuals in a higher risk of having their account compromised. It can help activists, politicians, celebrities, journalists, and public figures to save their accounts before attacks happen. As part of that program, Facebook will start forcing members of the program to implement the additional safety feature as soon as possible. The new policy will start rolling out all over the world in the coming months.

Two-factor authentication involves using an authentication app — like Google’s Authenticator — to access the app right after inputting the account’s password. Nowadays, a password is already an inadequate way to protect an account. Though the program will force compromised accounts to use the security feature, it is still recommended for everyone to use two-factor authentication to protect their accounts.

SEE ALSO: Facebook terminates Facial Recognition from platform

News

Twitter denies severity of hack involving 200M accounts

No passwords compromised, they say

Published

on

Twitter’s year started off with a bang it did not want. A cybersecurity report revealed that over 200 million Twitter accounts were compromised in a comprehensive leak that revealed their real name and email addresses. After some investigation, Twitter has responded to the leak and claims that things aren’t as severe as the initial report claims.

In an official Twitter Support post, the company investigated the database of accounts involved in the leak. In particular, the team cross-referenced the database with a previously known database originating from July and November 2022.

Though Twitter admits that the July leak came from a known vulnerability, the company did not find any correlation between July’s leak and both databases from November and January. Neither of the two latest databases are from new vulnerabilities.

Additionally, Twitter has reported that the database does not include any compromising information. None of the information contains passwords or anything that can lead to a compromised password. In fact, the company claims that the information likely came from other sources with information already available publicly.

However, the company is still continuing its investigation to determine the security of its users.

On the flip side, Alon Gal, who revealed the latest database, says that the database is one of the largest he’s ever seen. The cybersecurity expert also warns users of the potential harm caused by the database.

Still, in an age when cybersecurity takes precedence, there’s no harm in exercising more security measures for your accounts online. In the same report, Twitter recommends two-factor authentication to maximize security.

SEE ALSO: Over 200 million Twitter accounts involved in hacked database

Continue Reading

News

Over 200 million Twitter accounts involved in hacked database

From an old hack

Published

on

Twitter just can’t catch a break. After Elon Musk purchased the company, the platform has suffered a litany of problems over the past few months including controversial changes and malicious attacks. Now, a new security report has advised users that over 200 million Twitter accounts have had their email addresses leaked to hackers.

According to a LinkedIn post from Alon Gal, co-founder of cybersecurity firm Hudson Rock, a database of hacked accounts contained 235 million users and exposed their real names and email addresses. Gal states that this is “one of the most significant leaks [he’s] seen.”

Given how many active accounts there are on Twitter, 235 million accounts is not an insignificant figure. The database can potentially open a huge chunk of users, including notable personalities and celebrities, to hacks, scams, and doxing.

More concerning, the database isn’t a fresh hack. According to Bleeping Computer, the set is part of a hack that was exposed last year. At the time, only 5.4 million accounts were reported. Twitter previously claimed that the vulnerability which caused the hack has been patched. Further, the platform reported that no one was affected by the hack.

To check if you were affected, breach notification site HaveIBeenPwned.com can now check the vast database for your information. If you’re part of the database, be careful online and watch out for any potential attacks on your accounts.

SEE ALSO: Over 5.4 million Twitter accounts have just been exposed

Continue Reading

News

A new iMessage feature alerts you of any government spies

Anyone can use it

Published

on

Do you have an irrational fear of government hackers spying on your text messages? If you do, Apple has a new feature to help alleviate your phobia. Starting today, users can opt into the new iMessage Contact Key Verification feature, a security measure designed to prevent any unwanted snooping on your messages.

If it sounds too specific, it’s because Apple designed the feature for those who face “extraordinary digital threats,” like journalists and politicians. Naturally, this subset of the population can benefit from keeping their conversations away from snoopers (which includes, according to Apple, state-sponsored attackers). However, there’s no denying that the feature is also a boon to users who want an extra layer of protection for their messaging needs.

To use the feature, both the sender and the receiver need to have the option turned on while using their device. On a more basic level, the device will alert both users if an unexpected party suddenly crashes and enters the encrypted conversation. A more advanced level even allows iMessage users to compare verification codes, ensuring that both parties are indeed talking to whomever they intend to talk to.

While most users might not find a lot of use for an exorbitant amount of protection against hackers, it’s a step in the right direction for total message encryption. Despite some significant hiccups, Apple remains focused on bringing encryption to its users.

SEE ALSO: Apple is tracking users even with settings turned off

Continue Reading

Trending