Look at the FB business model. Who pays for all the staff, the server farms, and the exorbitant executive salaries? You do, in the form of your private data being sold to advertisers and anyone else who shells out a buck to FB (or LinkedIn, Google+, etc). You put stuff out there, it's gonna get sold to the highest bidder(s). Your hacker could have been a FB employee just jacking up the user count for their IPO.
Anything you put out on the "cloud", expect to get treated in the same way.
People ask me why I am not on FB, and I tell them. Privacy seems to be a thing of the past, both for the end user and the cloud vendors, and it takes something like this for people to wake up.
I've been browsing online more than 3 hours today, yet I never found any interesting article like yours. It is pretty worth enough for me. In my view, if all web owners and bloggers made good content as you did, the internet will be much more useful than ever before.Great post, you have pointed out some good details , I also think this s a very great website.
It is we people who have made FB or such other social networks part of our life .If we all collectively decide then such social networks will get reduced from those millions of members to may be a few thousand hackers who will keep stealing each others' identity.
For companies using Facebook to reach out to their customers this is a serious warning
I have regretted signing up on facebook almost as soon as I did. I am now thinking of dropping it altogether and letting my friends know that I am (so as to avoid "hurt" feelings and future spoofing). If enough people dropped FB then they WOULD sit up and take notice..
That had happened to me too three or four years ago.
No, you can't undo it.
I remember that I received a ton of e-mails from my friends that my facebook page got hacked -- at 9:30p.m. That's when it hit me that my friends are NOT watching TV but they are reading FB pages!
Your last paragraph says it all.
The guys who are developing social networks are operating under the assumption that "the user should have no reason to expect any privacy at all."
We should be all reminded of it; and I wish the social network companies would say it outright. Just like surgeon general's warning on smoking.
This comment is potentially troublesome, but the larger community should be aware of how vulnerable we are around open WiFi hot spots. EETimes, delete this if you think it is harmful.
A programmer has posted "free-ware" that allows anyone to instantly scan surrounding computers in an open WiFi environment and take over another user's Facebook, Twitter etc sessions with just a single click. The link below explains just how easy this is. Software install is easy too. He did it to protest websites that do not provide end-to-end session encryption (HTPPS or SSL) leaving users vulnerable. It is eye-popping. This is not a function of the browser, rather the website.
Home wireless routers with encryption enabled will be safe from this attack. I understand banks are using end-to-end encrypt.
E-t-E encryption puts higher processing loads on site servers, hence their reluctance to add the additional cost for consumer protection.
What are the engineering and design challenges in creating successful IoT devices? These devices are usually small, resource-constrained electronics designed to sense, collect, send, and/or interpret data. Some of the devices need to be smart enough to act upon data in real time, 24/7. Are the design challenges the same as with embedded systems, but with a little developer- and IT-skills added in? What do engineers need to know? Rick Merritt talks with two experts about the tools and best options for designing IoT devices in 2016. Specifically the guests will discuss sensors, security, and lessons from IoT deployments.