Tag Archive for: Here’s

What do mobile security statistics really mean? Here’s how to break them down

  1. What do mobile security statistics really mean? Here’s how to break them down  Brian Madden
  2. Full coverage

mobile security news – read more

Here’s how to see if you’re among the 30 million compromised Facebook users

A Facebook logo and a phone running Facebook.

Enlarge (credit: Getty Images | NurPhoto )

The attackers who carried out the mass hack that Facebook disclosed two weeks ago obtained user account data belonging to as many as 30 million users, the social network said on Friday. Some of that data—including phone numbers, email addresses, birth dates, searches, location check-ins, and the types of devices used to access the site—came from private accounts or was supposed to be restricted only to friends.

The revelation is the latest black eye for Facebook as it tries to recover from the scandal that came to light earlier this year in which Cambridge Analytica funneled highly personal details of more than 80 million users to an organization supporting then-presidential candidate Donald Trump. When Facebook disclosed the latest breach two weeks ago, CEO Mark Zuckerberg said he didn’t know if it allowed attackers to steal users’ private data. Friday’s update made clear that it did, although the 30 million people affected was less than the 50 million estimate previously given. Readers can check this link to see what, if any, data was obtained by the attackers.

On a conference call with reporters, Vice President of Product Management Guy Rosen said that at the request of the FBI, which is investigating the hack, Facebook isn’t providing any information about who the attackers are or their motivations or intentions. That means that for now, affected users should be extra vigilant when reading emails, taking calls, and receiving other types of communications. The ability to know the search queries, location check-ins, phone numbers, email addresses, and other personal details of so many people gives the attackers the ability to send highly customized emails, texts, and voice calls that may try to trick people into turning over money, passwords, or other high-value information.

Read 7 remaining paragraphs | Comments

Biz & IT – Ars Technica

Here’s why the Pixel 3 and 3 XL are Google’s most expensive phones ever

  1. Here’s why the Pixel 3 and 3 XL are Google’s most expensive phones ever  The Verge
  2. Google aims to create ‘closed loop’ for user data with new Titan Security mobile chip  Android Police
  3. Everything You Need to Know About the Google Pixel 3 XL  Gadget Hacks
  4. Google Pixel 3: The 5 features that matter most  PCWorld
  5. With the Pixel 3, Google Sticks to Its Software Smarts  WIRED
  6. Full coverage

android security news – read more