<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Facebook Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/facebook/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/facebook/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Wed, 24 Jan 2024 16:22:24 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Facebook Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/facebook/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 074 Data Scraping or Data Breaches</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-074-data-scraping-or-data-breaches/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 16 Apr 2021 01:15:34 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Breaches]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Clubhouse]]></category>
		<category><![CDATA[Clubhouse Breach]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Data Scraping]]></category>
		<category><![CDATA[Data Scraping or Data Breaches]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Facebook breach]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[LinkedIn Breach]]></category>
		<category><![CDATA[Scraping]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2496</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 74. This week we&#8217;re going to talk about Data Scraping or Data Breaches? Why am I asking the question &#8220;Data Scraping or Data Breaches&#8221;? In recent weeks, three of the large social media companies have had lots and lots of personal data exposed online by cybercriminals. Now these social media companies&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-074-data-scraping-or-data-breaches/">#WeekendWisdom 074 Data Scraping or Data Breaches</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 74. This week we&#8217;re going to talk about Data Scraping or Data Breaches?<span id="more-2496"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2496-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-074-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-074-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-074-lo.mp4</a></video></div>
<h3>Why am I asking the question &#8220;Data Scraping or Data Breaches&#8221;?</h3>
<p>In recent weeks, three of the large social media companies have had lots and lots of personal data exposed online by cybercriminals. Now these social media companies are claiming that these were data that were scraped from their services. That this information that is already in the public domain.</p>
<h3>These may have been Data Scraping</h3>
<p>In the case of Clubhouse which had 1.3 million records exposed and LinkedIn which had 500 million records exposed. Yes all of the data that was exposed is stuff that you can see on their platforms. You can see this information very publicly on their platforms. That&#8217;s a reasonable expectation. That&#8217;s what you use these sites for.</p>
<p>But my issue here is that LinkedIn and Clubhouse should have done much more. They could prevent data being exposed and scraped like that, in such mass quantities. That stuff can be slowed down. It can be made non-economical.</p>
<p>So yes, that was data scraping, maybe not really a data breach but more should have been done.</p>
<h3>But this one is definitely a Data Breach</h3>
<p>Facebook, which had 533 million records exposed, this is a different situation. They had my mobile number and I had only given it to them for the purpose of authenticating my log on and I had set it to not expose that information to the public. My mobile number was exposed to the public. So therefore that is a data breach, simple as.</p>
<p>Facebook are being disingenuous with their claim that this was data scraping.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-074-data-scraping-or-data-breaches/">#WeekendWisdom 074 Data Scraping or Data Breaches</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/04/WeekendWisdom-074-lo.mp4" length="34654962" type="video/mp4" />

			</item>
		<item>
		<title>Whatsapp Authentication Sucks</title>
		<link>https://www.l2cybersecurity.com/whatsapp-authentication-sucks/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 11 Jan 2019 16:56:07 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Whatsapp]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1570</guid>

					<description><![CDATA[<p>Whatsapp Authentication sucks. It sucks really badly. I&#8217;d never thought about it before, but then I saw this tweet yesterday. A lady got a new phone number and when she set up Whatsapp, she had a load of messages on there from the previous owner of the number. &#8220;Wait a minute!&#8221; I hear you cry &#8220;Surely&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/whatsapp-authentication-sucks/">Whatsapp Authentication Sucks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1571" src="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Whatsapp-Authentication-Sucks-150x150.png" alt="Whatsapp authentication sucks" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Whatsapp-Authentication-Sucks-150x150.png 150w, https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Whatsapp-Authentication-Sucks.png 300w" sizes="(max-width: 150px) 100vw, 150px" />Whatsapp Authentication sucks. It sucks really badly. I&#8217;d never thought about it before, but then I saw <a href="https://twitter.com/abbyfuller/status/1083560674884694017?s=19" target="_blank" rel="noopener">this tweet yesterday</a>. A lady got a new phone number and when she set up Whatsapp, she had a load of messages on there from the previous owner of the number. <span id="more-1570"></span>&#8220;Wait a minute!&#8221; I hear you cry &#8220;Surely Whatsapp, owned by Facebook and used by millions of people, has super security?&#8221; Well I&#8217;m sure it&#8217;s back-end systems are all well protected. The messages between users are all properly encrypted and secure. But to authenticate to the service &#8230; all you need is a telephone number. If you use the telephone number of another user or a former user, you get their messages!!! There is a way to prevent this, which I&#8217;ll get to later.</p>
<h3>Setting up an account is sooo easy</h3>
<p>Cast your mind back to when you set up Whatsapp on your phone for the first time and you set up your account with them. Did you specify a User ID or Username? Did you give it a password? The answer is no. The only authentication was your telephone number, which your phone was giving the app.</p>
<h3>Recycling is good for the planet, but not good for security</h3>
<p>Mobile telephone numbers get recycled by telephone companies all the time. This is because they don&#8217;t have an unlimited amount of numbers that they can issue. If you watch enough crime programmes on the TV, you will see a lot of &#8220;burner&#8221; phones being used. These are basically a cheap phone and number that might only be used once or twice and then is disposed of forever. Also, people having affairs would sometimes have a second &#8220;secret&#8221; phone for communicating with their paramour. If the affair doesn&#8217;t last long, that phone number will be disposed of.</p>
<p>So phone companies that have old numbers, where a contract hasn&#8217;t been renewed or a prepaid number has not been topped up in some time, they will simply assign them to new SIM cards and push them out through their retail channels. Thus the number is recycled and reused.</p>
<p>This is what happened to <a href="https://twitter.com/abbyfuller/status/1083560674884694017?s=19" target="_blank" rel="noopener">Abby Fuller</a>. She got a new number and when she installed Whatsapp, she had all of the messages from that telephone number&#8217;s previous owner restored onto her device. Because the number is the only means of identifying an account, this is why Whatsapp authentication sucks.</p>
<p>She took the correct course of action and deleted everything. However if she had a bad side, she could have downloaded all of the messages or even worse, she could have impersonated that number&#8217;s previous owner in those messages and caused all sorts of issues.</p>
<h3>So Whatsapp authentication sucks. What can I do about it?</h3>
<p>You can set up, what Whatsapp calls, two step verification. With this enabled, if you (or somebody else), try to setup Whatsapp with your number on a different phone, you (or they) will be asked for a PIN number, which only you should know.</p>
<p>It&#8217;s really easy to set up:</p>
<ol>
<li>Go into your Whatsapp settings</li>
<li>Select Account -&gt; Two step verification</li>
<li>It will have an explanation screen. Click Enable</li>
<li>Provide a 6 digit PIN number and then confirm it</li>
<li>Optionally (but recommended) you can provide an email address should you forget the PIN number, where a PIN reset request can be sent. You will need to confirm that email address</li>
<li>That&#8217;s it</li>
</ol>
<p>If somebody gets your number or they try to take over your phone number, when they try to set up Whatsapp, they will need to input the PIN you just set up. It&#8217;s not really the best <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/" target="_blank" rel="noopener">two step verification</a> in the world, but it should be effective.</p>
<p>I must try and persuade the few Whatsapp groups that I am involved in to switch to something more secure like <a href="https://signal.org/" target="_blank" rel="noopener">Signal</a>.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified #GDPR #SimpleGDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/whatsapp-authentication-sucks/">Whatsapp Authentication Sucks</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Facebook are only fined £500,000</title>
		<link>https://www.l2cybersecurity.com/facebook-are-only-fined-500000/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 26 Oct 2018 10:27:16 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[DPC]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Fined]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[ICO]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1444</guid>

					<description><![CDATA[<p>You remember the Facebook/Cambridge Analytica mess from earlier this year? Well, Facebook have been issued with a notice that they are to be fined £500,000 as a result of this. &#8220;What? Facebook are only fined £500,000?&#8221; I hear you cry. Yes that is maximum penalty that the Information Commissioners Office (ICO) in the UK are able to&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/facebook-are-only-fined-500000/">Facebook are only fined £500,000</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1445" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/facebook-are-only-fined-150x150.jpeg" alt="Facebook are only fined £500,000" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/facebook-are-only-fined-150x150.jpeg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/10/facebook-are-only-fined.jpeg 300w" sizes="(max-width: 150px) 100vw, 150px" />You remember the <a href="https://www.l2cybersecurity.com/cambridge-analytica-nosey-ninnies/" target="_blank" rel="noopener">Facebook/Cambridge Analytica mess</a> from earlier this year? Well, Facebook have been issued with a notice that <a href="https://ico.org.uk/media/action-weve-taken/mpns/2260051/r-facebook-mpn-20181024.pdf" target="_blank" rel="noopener">they are to be fined £500,000</a> as a result of this. &#8220;What? Facebook are only fined £500,000?&#8221; I hear you cry. <span id="more-1444"></span>Yes that is maximum penalty that the Information Commissioners Office (ICO) in the UK are able to levy under the Data Protection Act 1998.</p>
<p>&#8220;But where are the €20m or 4% of turnover fines for violating the GDPR?&#8221; you shout. As the underlying data breach incident occurred some years ago and surfaced before the #GDPR went into effect in May 2018, then they couldn&#8217;t be prosecuted under the Data Protection Act 2018, which implements the GDPR.</p>
<p>But this is still a significant judgement. The ICO has gone for the maximum possible penalty against Facebook, showing that what they were up to was completely unacceptable and rightly so. They found that Facebook had breached two of the principles of data protection:</p>
<ol>
<li>Facebook had unfairly processed personal data.</li>
<li>And they didn&#8217;t put in place appropriate measures to prevent unauthorised or unlawful processing of personal data.</li>
</ol>
<p>So while Facebook are only fined £500,000 this time, this is a clear indication that data protection authorities won&#8217;t be afraid of going after the maximum fines available to them for failures in respect to protecting peoples personal data.</p>
<p>Also don&#8217;t forget that the Irish Data Protection Commissioner is <a href="https://www.l2cybersecurity.com/facebook-breach-dpc-public/" target="_blank" rel="noopener">investigating Facebook for a GDPR era incident</a>. That incident started with 50m people affected with another 40m possibly impacted. It dropped down to only ~30m affected &#8230; but that&#8217;s still ~30,000,000 people. Of those, 14m had the following personal data accessed:</p>
<blockquote><p>Username, gender, locale/language, relationship status, religion, hometown, self-reported current city, birthdate, device types used to access Facebook, education, work, the last 10 places they checked into or were tagged in, website, people or Pages they follow, and the 15 most recent searches.</p></blockquote>
<p>That is a massive amount of personal data to have been harvested, and could definitely be used against the victims. That particular investigation will be a big one and will probably run into some time in 2019.</p>
<p>In the meantime, lets be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/facebook-are-only-fined-500000/">Facebook are only fined £500,000</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Facebook Breach &#8211; The DPC was very public about it.</title>
		<link>https://www.l2cybersecurity.com/facebook-breach-dpc-public/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 05 Oct 2018 15:11:05 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection Commission]]></category>
		<category><![CDATA[DPC]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Facebook breach]]></category>
		<category><![CDATA[GDPR]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1418</guid>

					<description><![CDATA[<p>Unless you&#8217;ve been living under a rock for the last week, you will have heard about the Facebook breach. This is where the accounts of at least 50 million people were compromised by evil doers. There was another 40 million people who may have been at risk too. Facebook became aware of the breach on&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/facebook-breach-dpc-public/">Facebook Breach &#8211; The DPC was very public about it.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-2875" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/Facebook-Breach-1-150x150.jpg" alt="Facebook Breach" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/Facebook-Breach-1-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/10/Facebook-Breach-1.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />Unless you&#8217;ve been living under a rock for the last week, you will have heard about the Facebook breach. This is where the accounts of at least 50 million people were compromised by evil doers. <span id="more-1418"></span>There was another 40 million people who may have been at risk too. Facebook became aware of the breach on Tuesday 25th September and took action by Thursday 27th. This action was to log the 90 million users out of Facebook and make them sign in again. They reported the data breach to the Data Protection Commission (DPC) on Friday 28th September.</p>
<p>As you should know by now, the General Data Protection Regulation (GDPR) requires a business to notify the regulatory authority for data protection within 72 hours of becoming aware of the breach, where there is a risk to the rights and freedoms of the affected individuals. They also must notify the affected individuals if there is a high risk to their rights and freedoms and must do so without undue delay.</p>
<p>Facebook notified both on Friday. They put out <a href="https://newsroom.fb.com/news/2018/09/security-update/" target="_blank" rel="noopener">a public notice</a> about the breach and the DPC were notified, as <a href="https://www.dataprotection.ie/docs/EN/03-10-2018-Facebook-Data-Breach-Commencement-of-Investigation/i/1787.htm">confirmed by them</a> earlier this week. Here are some tweets from the Data Protection Commission:</p>
<p><img loading="lazy" decoding="async" width="577" height="337" class="size-full wp-image-1421 aligncenter" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/DPC-Tweet-1.jpg" alt="&quot;&lt;yoastmark" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/DPC-Tweet-1.jpg 577w, https://www.l2cybersecurity.com/wp-content/uploads/2018/10/DPC-Tweet-1-300x175.jpg 300w" sizes="auto, (max-width: 577px) 100vw, 577px" /></p>
<p><img loading="lazy" decoding="async" width="582" height="475" class="wp-image-1422 size-full aligncenter" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/DPC-Tweet-2.jpg" alt="&quot;&lt;yoastmark" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/DPC-Tweet-2.jpg 582w, https://www.l2cybersecurity.com/wp-content/uploads/2018/10/DPC-Tweet-2-300x245.jpg 300w" sizes="auto, (max-width: 582px) 100vw, 582px" /></p>
<p><img loading="lazy" decoding="async" width="570" height="676" class="size-full wp-image-1423 aligncenter" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/DPC-Tweet-3.jpg" alt="&quot;&lt;yoastmark" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/10/DPC-Tweet-3.jpg 570w, https://www.l2cybersecurity.com/wp-content/uploads/2018/10/DPC-Tweet-3-253x300.jpg 253w" sizes="auto, (max-width: 570px) 100vw, 570px" /></p>
<h3>The DPC talked very publicly about the Facebook breach, didn&#8217;t they?</h3>
<p>And this is what I want to address in this post. This Facebook breach was addressed very publicly by the DPC. I would believe that this is because Facebook is such a huge source of personal data. Also the fact that this story has attracted massive worldwide attention. If they didn&#8217;t come out with those tweets, they would have been accused of all sorts of bad practice.</p>
<p>I don&#8217;t expect them to be publicly tweeting about a data breach in a small business, which accidentally sent a spreadsheet containing customer personal data to an incorrect e-mail recipient. It&#8217;s very important you realise this. I don&#8217;t want any business owner, who becomes aware of a data breach which needs to be reported, to decide not to notify the DPC in case they should start tweeting about it.</p>
<p>If you become aware of a notifiable breach, please report it. Unless you are a massive source of personal data, I don&#8217;t expect the DPC to tweet about it. It will be dealt with reasonably discreetly.</p>
<h3>Want to find out more about data breaches?</h3>
<p>I did a short (&lt;2 minute) video on <a href="https://www.l2cybersecurity.com/video-6-examples-data-breach/" target="_blank" rel="noopener">6 examples of a data breach</a>. If you head over to my <a href="https://www.youtube.com/channel/UCJzeEIeoYCmU8T5jkQjnekg" target="_blank" rel="noopener">YouTube channel</a> you can see an entire video series with more discussion about the different examples of data breaches.</p>
<p>In the meantime, lets be careful out there.</p>
<p>#GDPR #SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/facebook-breach-dpc-public/">Facebook Breach &#8211; The DPC was very public about it.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cambridge Analytica were nosey ninnies</title>
		<link>https://www.l2cybersecurity.com/cambridge-analytica-nosey-ninnies/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 21 Mar 2018 10:55:23 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Cambridge Analytica]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Facebook]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1174</guid>

					<description><![CDATA[<p>Cambridge Analytica have been rumbled. They have used Facebook data in ways that it should not have been used. By doing so, they have influenced and possibly manipulated the results of a number of elections across the world in recent years. Most notably the 2016 US Presidential Election. This has been blown up as a big&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/cambridge-analytica-nosey-ninnies/">Cambridge Analytica were nosey ninnies</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft size-thumbnail wp-image-1175" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/Cambridge-Analytica-and-Facebook-150x150.jpg" alt="Cambridge Analytica and Facebook" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/Cambridge-Analytica-and-Facebook-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2018/03/Cambridge-Analytica-and-Facebook.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />Cambridge Analytica have been rumbled. They have used Facebook data in ways that it should not have been used. By doing so, they have influenced and possibly manipulated the results of a number of elections across the world in recent years. Most notably the 2016 US Presidential Election. <span id="more-1174"></span>This has been blown up as a big scandal and rightly so. However, are we really surprised? Think about it rationally. Should we be surprised that the huge volume of data that we hand over to Facebook is utilised in ways that are incomprehensible to us? The vast majority of us are not data scientists, so we may not realise that by &#8220;Liking&#8221; that funny picture lampooning a political figure, we are giving Facebook a possible indication of our political preferences.</p>
<h3>What did Cambridge Analytica do?</h3>
<p>In 2015, Dr Aleksandr Kogan, who was a lecturer at Cambridge University&#8217;s Department of Psychology, put out an &#8220;App&#8221; on Facebook which carried out a survey for the purposes of &#8220;scientific research&#8221;. <span id="c128" class="notranslate">?</span></p>
<p>This app had some 270,000 people use it on their Facebook page. &#8220;In so doing, they gave their consent for Kogan to access information such as the city they set on their profile, or content they had liked, as well as more limited information about friends who had their privacy settings set to allow it.” according to a <a href="https://newsroom.fb.com/news/2018/03/suspending-cambridge-analytica/">Facebook statement</a>.</p>
<p>Basically, this &#8220;App&#8221; profiled the people who used it, then probed into the Facebook profiles of the friends of that 270,000 and profiled them as well. This is where the 50 million affected people figure came from.</p>
<p>Just to be clear &#8211; There was no <span style="text-decoration: underline;"><strong>breach</strong></span> of Facebook data in this &#8220;scandal&#8221;. Facebook had a &#8220;Feature&#8221; at the time which allowed apps to look at freinds profiles. These apps would have told the users that this is what they were enabling before they used the app for the first time. You know. At that screen that nobody (but me) reads! Here&#8217;s an example.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-1186 size-full" src="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/FB-App-permissions.jpg" alt="Facebook App Permissions example" width="647" height="344" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2018/03/FB-App-permissions.jpg 647w, https://www.l2cybersecurity.com/wp-content/uploads/2018/03/FB-App-permissions-300x160.jpg 300w" sizes="auto, (max-width: 647px) 100vw, 647px" /></p>
<p>Cambridge Analytica then used all of the data to psychologically profile Americans and then target specific political messages, which would definitely influence that individual. Doing so to 50 million individuals is tantamount to manipulation.</p>
<p>This video has a CA whistle blower telling what they did:</p>
<p><iframe loading="lazy" title="Cambridge Analytica: Whistleblower reveals data grab of 50 million Facebook profiles" width="500" height="281" src="https://www.youtube.com/embed/zb6-xz-geH4?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<h3>Should I delete my Facebook account?</h3>
<p>Well that is completely up to you.</p>
<p>I deleted my original Facebook account back in about 2012, after I downloaded a copy of my Facebook data and saw just how much information I had given them and what it could be potentially used for. It&#8217;s not just the content of posts, photos and videos that I had put on the platform (and I was fairly prolific at the time), but it was all of the Likes and Shares of different things that caused me concern.</p>
<p>By looking at all of this data in one place, I could see that they could potentially see who and what I was about and what my opinions might be.</p>
<p>It freaked me out.</p>
<p>I deleted my account.</p>
<p>I created a new account in 2014 as I had become involved in a <a href="https://www.facebook.com/KREnergyTeam">community project</a> which needed online exposure. I have expanded that to a <a href="https://www.facebook.com/MulcairMensShed/">few other</a> community projects, as well as my own <a href="https://www.facebook.com/L2Cyber/">business page</a>, but I am pretty frugal with anything else I give Facebook. I usually limit it to photos of my dogs, the scenery or the weather.</p>
<p>I recently downloaded my Facebook data again and because I have been careful, I don&#8217;t see too much in they way for potential manipulation with it.</p>
<p>I needn&#8217;t worry too much, because I never believe anything I read &#8230; particularly on Facebook. <span id="c116" class="notranslate">?</span><span id="c116" class="notranslate">?</span><span id="c116" class="notranslate">?</span></p>
<p>But have a read of this other <a href="https://www.l2cybersecurity.com/data-breaches-what-risk/">short blog</a> about what breached data can be used for.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.l2cybersecurity.com/cambridge-analytica-nosey-ninnies/">Cambridge Analytica were nosey ninnies</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Take a 2-Minute Privacy check-up.</title>
		<link>https://www.l2cybersecurity.com/take-2-minute-privacy-check/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 12 May 2017 15:47:08 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Defence in Depth]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[GMail]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Twitter]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=649</guid>

					<description><![CDATA[<p>After last week&#8217;s brief shenanigans with GMail getting phished badly and the recommendation I made about how to help correct and protect yourself from that nasty piece of work, I went ahead and did something I had not done in some time. A privacy check-up and there is also a security or account check-up available too.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/take-2-minute-privacy-check/">Take a 2-Minute Privacy check-up.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="wp-image-650 size-thumbnail alignleft" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/05/2-Minute-Privacy-150x150.jpg" alt="2 Minute Privacy Check-up" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/05/2-Minute-Privacy-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2017/05/2-Minute-Privacy.jpg 300w" sizes="auto, (max-width: 150px) 100vw, 150px" />After last week&#8217;s brief shenanigans with <a href="http://www.l2cybersecurity.com/gmail-users-phished/">GMail getting phished badly</a> and the recommendation I made about how to help correct and protect yourself from that nasty piece of work, I went ahead and did something I had not done in some time. A privacy check-up and there is also a security or account check-up available too.<span id="more-649"></span></p>
<p>Most of the big on-line services have this facility buried in their settings somewhere, but when you find them, they are really easy to go through and it can be an eye-opening exercise. I discovered on my personal GMail account, that a phone I had on loan while my own was off getting repaired was still an authorised device on my account. I wasn&#8217;t too concerned, because I myself had carried out a factory reset on that phone before I handed the loaner back in.</p>
<p>However, most people would not think to do such a thing and, while you would expect the repair shop to do it as part of their procedures, this does not necessarily make it happen &#8230; and I&#8217;m not talking about the small phone repair shops that are dotted about the place either. A friend got a loaner phone from one of the big mobile companies while her&#8217;s was sent for repair. She took a few photos one day and was browsing them that evening and she came across a few dozen photos of some people she did not recognise. She mentioned this to the shop when she collected her repaired phone. They apologised profusely, immediately did a factory reset on the loaner and showed her the completely empty device when it restarted. That was OK for her. But what about the previous user of the device. What if she knew even one of the people in those photos? What if the photos were embarrassing or worse &#8230; incriminating? <img decoding="async" src="https://www.facebook.com/images/emoji.php/v8/f15/1/28/1f914.png" alt="?" /></p>
<p>Anyway, I&#8217;ve done a Billy Connolly and wandered wildly off-topic, so back to privacy check-ups.</p>
<p>You can do these all at once, if you want, or just take 2 minutes each day over the next few days and do a privacy check-up and security/account check-up on each account. I would also recommend you do this on a desktop/laptop, as the mobile apps may not have the full set of privacy settings to be checked. Finally don&#8217;t just be looking for authorised devices, keep an eye out for Apps which are authorised on your accounts, which you may no longer use. You should really remove their access.</p>
<p>GMail &#8230; has both privacy <a href="https://myaccount.google.com/privacy">https://myaccount.google.com/privacy</a> and security <a href="https://myaccount.google.com/security">https://myaccount.google.com/security</a> check-ups</p>
<p>LinkedIn &#8230; has privacy <a href="https://www.linkedin.com/psettings/privacy">https://www.linkedin.com/psettings/privacy</a> and account <a href="https://www.linkedin.com/psettings/account">https://www.linkedin.com/psettings/account</a> settings pages.</p>
<p>FaceBook &#8230; privacy <a href="https://www.facebook.com/settings?tab=privacy">https://www.facebook.com/settings?tab=privacy</a> and security <a href="https://www.facebook.com/settings?tab=security">https://www.facebook.com/settings?tab=security</a></p>
<p>Twitter &#8230; Privacy <a href="https://twitter.com/settings/safety">https://twitter.com/settings/safety</a> and account <a href="https://twitter.com/settings/account">https://twitter.com/settings/account</a> settings</p>
<p>Other online services that you use might have something similar. Just go into their settings and search for privacy and account or security tabs and simply go through each of them.</p>
<p>You might even pop a reminder into your calendar to come back in 6 months time and review these settings again because lets face it, something will have changed.</p>
<p>And hey &#8230; Let&#8217;s be careful out there.</p>
<p>The post <a href="https://www.l2cybersecurity.com/take-2-minute-privacy-check/">Take a 2-Minute Privacy check-up.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Facebook Messenger scam &#8230; it&#8217;s nothing new, but it&#8217;s still effective.</title>
		<link>https://www.l2cybersecurity.com/facebook-messenger-scam/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 29 Dec 2016 18:44:39 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Fake]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Scam]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=474</guid>

					<description><![CDATA[<p>I&#8217;ve seen evidence of this scam occurring amongst my Facebook friends this Christmas. It&#8217;s a straightforward phishing scam, where one of your friends sends you a Facebook Message with an apparent link to a video of you. Sometimes they might ask &#8220;Is this you?&#8221; or tell you to go a specific point in the video&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/facebook-messenger-scam/">Facebook Messenger scam &#8230; it&#8217;s nothing new, but it&#8217;s still effective.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft" src="https://3.bp.blogspot.com/-qxQazzFfSC4/WGVRrdjSMvI/AAAAAAAAA80/CXvMAh9RaEgIe1RKJjnONqMD_ccMET7DQCLcB/s320/facebook-scam.gif" alt="Facebook messenger scam" width="320" height="100" /></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">I&#8217;ve seen evidence of this scam occurring amongst my Facebook friends this Christmas. It&#8217;s a straightforward phishing scam, where one of your friends sends you a Facebook Message with an apparent link to a video of you. Sometimes they might ask &#8220;Is this you?&#8221; or tell you to go a specific point in the video to see yourself. Of course what has happened is your friend&#8217;s account has been hacked and the scammers are using your friend&#8217;s contact list to spread their evil wares.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">This is an example of a message that a friend of mine received from one of their Facebook friends. I&#8217;ve blurred the pics and redacted the name to protect the parties involved:</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: left;"><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><a href="https://3.bp.blogspot.com/-qODdxoc8V20/WGVS-xdU8ZI/AAAAAAAAA9A/JW2eSV4FhqQ0ot3t8CuwfUsCY77SGH-cgCLcB/s1600/fb%2Bhack2.jpg" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://3.bp.blogspot.com/-qODdxoc8V20/WGVS-xdU8ZI/AAAAAAAAA9A/JW2eSV4FhqQ0ot3t8CuwfUsCY77SGH-cgCLcB/s400/fb%2Bhack2.jpg" width="400" height="234" border="0" /></a></span></p>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: left;">This is pretty compelling. It looks like there is a video of you on YouTube with nearly 384K views. You&#8217;ve got to go see what everybody is looking at &#8230; right?</p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">WRONG!</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">If you click on this, it will either take you to a web page that asks you to sign-in to Facebook with your ID and password or it tries to install a facebook app and looks for various permissions to your Facebook profile.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">If you proceed with either signing in or installing the app, then your Facebook profile now belongs to the bad guys. They will mercilessly spam and phish your Facebook friends. </span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">If you have fallen for this, then first thing to do is remove the app from your Facebook account (if it has access). Go to <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">Facebook -&gt; Settings -&gt; Apps</span> and locate the offending app and remove it&#8217;s access. You could also go into <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">Facebook -&gt; Settings -&gt; Blocking</span> and block the app there too.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Next thing you must do is change your Facebook password. You will find this under <span style="color: #0000ff;" data-blogger-escaped-style="color: blue;">Facebook -&gt; Settings -&gt; General</span>.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">And finally, if you had used the same password for Facebook and for your e-mail, for the love of dogs, change your e-mail password right now and change it to something else completely different to your Facebook password. If the evil doers compromise your e-mail account, your online life will become a lot more troublesome for you than a few spammy Facebook messages.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Finally, finally &#8211; if you have not already done so, turn on <i>Two Step Verification</i><span style="color: #ff0000;" data-blogger-escaped-style="color: red;">/</span><i>Login Approvals</i><span style="color: #ff0000;" data-blogger-escaped-style="color: red;">/</span><i>Two Factor Authentication</i>, whatever they call it, on your all of the on-line accounts that you have, which have this feature. What this means is that not only do you have to have your user ID and password to access your account, but also a code generated by an App on your phone or a text message sent to your phone which adds another layer of protection. If the bad guys get your ID and password, they won&#8217;t be able to compromise your account without access to your phone.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">There&#8217;s more detail about this subject <a href="http://www.l2cybersecurity.com/vii-use-two-factor-authentication/">here</a>.</span></p>
<p><span style="font-family: 'helvetica neue', arial, helvetica, sans-serif;" data-blogger-escaped-style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Let&#8217;s be careful out there.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;"></div>
<p>The post <a href="https://www.l2cybersecurity.com/facebook-messenger-scam/">Facebook Messenger scam &#8230; it&#8217;s nothing new, but it&#8217;s still effective.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Here is a worrying aspect of the Yahoo breach.</title>
		<link>https://www.l2cybersecurity.com/worrying-aspect-yahoo-breach/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 23 Sep 2016 16:48:06 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Best Practice]]></category>
		<category><![CDATA[Commandments]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[LinkedIn]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[Yahoo]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=486</guid>

					<description><![CDATA[<p>Everyone has heard about the personal information related to 500 million Yahoo accounts being stolen from Yahoo in 2014. There&#8217;s lots of helpful tips out there (and some here too), but some people may not realise that they have a Yahoo account. Yahoo provides e-mail services to some big internet service providers (ISPs), over in&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/worrying-aspect-yahoo-breach/">Here is a worrying aspect of the Yahoo breach.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignleft" src="https://1.bp.blogspot.com/-8EJZw55EX-U/V-VZ9S-st4I/AAAAAAAAAZg/fyZ9OhxST109aBuR3LdTURkTZ2eoehrhwCLcB/s200/Yahoo.jpg" alt="Yahoo hacked" width="200" height="129" /></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Everyone has heard about the personal information related to 500 million Yahoo accounts being stolen from Yahoo in 2014. There&#8217;s lots of helpful tips out there (and some here too), but some people may not realise that they have a Yahoo account.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Yahoo provides e-mail services to some big internet service providers (ISPs), over in the US <a href="http://att.yahoo.com/" data-blogger-escaped-target="_blank">AT&amp;T</a>, <a href="http://ca.rogers.yahoo.com/" data-blogger-escaped-target="_blank">Rogers</a> and <a href="http://login.frontier.com/webmail/">Frontier.com</a>. Over on this side of the Atlantic <a href="http://www.sky.com/">Sky</a> and <a href="http://home.bt.com/">BT</a> are large ISPs operating in Ireland and the UK. Their e-mail services are powered by Yahoo.</span></p>
</div>
<p><span id="more-486"></span></p>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">There are <a href="http://www.bbc.com/news/world-us-canada-37447016">reports</a> that Sky and BT are contacting their customers, so that at least should hopefully highlight to those people that, yes, you do have a Yahoo account too, it&#8217;s just by a different name.</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Helpful tip #1</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">A large amount of the Yahoo accounts will no doubt be dormant and no longer in use by their owners. I certainly had a Yahoo account quite some time ago, but I never associated it with myself (shock/horror &#8211; I lied on the Internet ?) or with any other account. The bad guys are welcome to it, as I know it can&#8217;t connect to me.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">However if you used the same user name on a Yahoo account (dormant or not) on some other accounts (GMail, Facebook, LinkedIn, Microsoft, etc.) then the Yahoo account details could be tried by the evil doers against these other services.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Of course, you will have used the same password on them all, so that&#8217;ll make their life so much easier to ruin yours. ?</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">So the first tip is to change your Yahoo account password now. You should also change this password on all of the other online accounts that you use it on. However this time you might take the sensible decision and give every account a unique password. You can learn how to do this easily at the <a href="https://www.l2cybersecurity.com/security-awareness-training/">Internet Safety Training</a> which L2 Cyber Security Solutions deliver. However if you struggle to come up with the means to do this, then you should invest in a <a href="https://en.wikipedia.org/wiki/Password_manager">Password Manager</a>. This can do the hard work for you.</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Helpful tip #2</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">On any on-line service that you use, if it has a means to implement, what is called, Two Factor Authentication, then turn it on NOW! I cannot stress how much this improves your security position just by turning this feature on.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">I go into in more detail <a href="https://www.l2cybersecurity.com/protect-online-accounts/">here</a>, but briefly, if you are using Facebook or Dropbox (to name but two, there are dozens that subscribe to this method) you can download the <a href="https://support.google.com/accounts/answer/1066447?hl=en">Google Authenticator</a> App onto your smart phone (available on <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2&amp;hl=en">Android</a> and <a href="https://itunes.apple.com/en/app/google-authenticator/id388497605?mt=8">Apple</a>). Then inside in the account security settings of your on-line service, activate the Two Factor Authentication, telling it you use Google Authenticator. It will put up a QR code on screen, which you show to the App and it will then start generating a 6 digit code that changes every 30 seconds.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">So now what happens is that if you (or some evil doer) tries to sign on to your account from a different device or location, even if they have your password they will also now need the 6 digit code that is showing up on your Google Authenticator App. Without it, they get nowhere.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">If the on-line service does not support Google Authenticator, then they might send you a text message instead. This is not quite as secure as the App, but it is better than nothing.</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Helpful tip #3</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">It wasn&#8217;t just user name and passwords that were stolen, but details like date-of-birth, mobile phone number and answers to security questions.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Details like date-of-birth and mobile number are kinda hard to change, but the security questions are another concern. If you have some other on-line accounts that use the same security questions, now would be a good time to go and change these.</span></p>
</div>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">A much simpler solution would be to implement Two Factor Authentication, as outlined above.</span></p>
</div>
<h3 data-blogger-escaped-style="text-align: justify;"><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">Conclusion</span></h3>
<div data-blogger-escaped-style="text-align: justify;">
<p><span style="font-family: verdana, sans-serif;" data-blogger-escaped-style="font-family: &quot;verdana&quot; , sans-serif;">The internet is a wonderful but dangerous place and there are a lot of bad guys who are making a lot of money from your accounts. So &#8230;</span></p>
</div>
<p class="separator" data-blogger-escaped-style="clear: both; text-align: center;"><a href="https://2.bp.blogspot.com/-53nIn9qa3cM/V-Vb_5nybnI/AAAAAAAAAZw/AWG-gOSFSwULKBlBzH57ixBKbQ0uW0J_gCLcB/s1600/Let%2527s%2Bbe%2Bcareful%2Bout%2Bthere.gif" data-blogger-escaped-style="margin-left: 1em; margin-right: 1em;"><img loading="lazy" decoding="async" class="aligncenter" src="https://2.bp.blogspot.com/-53nIn9qa3cM/V-Vb_5nybnI/AAAAAAAAAZw/AWG-gOSFSwULKBlBzH57ixBKbQ0uW0J_gCLcB/s400/Let%2527s%2Bbe%2Bcareful%2Bout%2Bthere.gif" width="400" height="266" border="0" /></a></p>
<div data-blogger-escaped-style="text-align: justify;"></div>
<p>The post <a href="https://www.l2cybersecurity.com/worrying-aspect-yahoo-breach/">Here is a worrying aspect of the Yahoo breach.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Sneaky Facebook phishing attack.</title>
		<link>https://www.l2cybersecurity.com/sneaky-facebook-phishing-attack/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 16 May 2016 13:35:51 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">http://www.l2cybersecurity.com/?p=506</guid>

					<description><![CDATA[<p>I became aware of this really sneaky attempt by hackers to steal people&#8217;s Facebook ID and password recently. This is known as phishing and it&#8217;s quite clever and I must admit that I could quite easily have fallen victim to it, had I not read the article. I&#8217;ve put a link to the full article&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/sneaky-facebook-phishing-attack/">Sneaky Facebook phishing attack.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I became aware of this really sneaky attempt by hackers to steal people&#8217;s Facebook ID and password recently. This is known as phishing and it&#8217;s quite clever and I must admit that I could quite easily have fallen victim to it, had I not read the article.</p>
<p>I&#8217;ve put a link to the full article at the bottom of this post, but essentially what happens is:<span id="more-506"></span></p>
<ul>
<li data-blogger-escaped-style="text-align: justify;">If you click on a compromised link, a very legitimate looking &#8220;Facebook Page Verification&#8221; form will appear asking for your e-mail/phone, password and a  security question.</li>
</ul>
<p><img loading="lazy" decoding="async" class="wp-image-507 aligncenter" src="http://www.l2cybersecurity.com/wp-content/uploads/2017/03/facebook-phish-page-300x195.jpg" alt="Facebook Phishing example" width="532" height="346" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2017/03/facebook-phish-page-300x195.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2017/03/facebook-phish-page.jpg 640w" sizes="auto, (max-width: 532px) 100vw, 532px" /></p>
<ul>
<li data-blogger-escaped-style="text-align: justify;">If you fill it in, it will say that the first attempt is incorrect.</li>
<li data-blogger-escaped-style="text-align: justify;">If you fill it in again, it will then come back to say it has been accepted and is awaiting approval, which might take 24 hours.</li>
</ul>
<p>The failure at the first attempt is a clever ruse to fool people that might input a false ID and password initially (in case the form is illegitimate) before proceeding with their correct credentials when they perceive the site to be legitimate (as it rejected their false details).</p>
<p>Whatever you have typed in will be taken and used/abused by the evildoers.</p>
<p>The only way to protect yourself from being compromised by these type of phishing scams is to turn on &#8220;Login Approvals&#8221; in your Facebook security settings. This will mean if somebody (including you) try to log in to your Facebook account from a different device/location, they will need to use your phone to get a code to prove you are who you told Facebook you are.</p>
<p>If you have already filled in your details on this page, change your Facebook password immediately and turn on the Login Approvals. If your e-mail account associated with Facebook has the same password, then change that one too and if possible turn on it&#8217;s Two-Factor Authentication (i.e. to use your phone to secure that account as well).</p>
<p>And lets be careful out there!</p>
<p><a href="http://news.netcraft.com/archives/2016/04/22/hook-like-and-sinker-facebook-serves-up-its-own-phish.html" data-blogger-escaped-target="_blank">http://news.netcraft.com/archives/2016/04/22/hook-like-and-sinker-facebook-serves-up-its-own-phish.html</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/sneaky-facebook-phishing-attack/">Sneaky Facebook phishing attack.</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
