Last month, Facebook and Instagram were hit by a major bug that exposed users’ passwords as plain text. Facebook has now confirmed that even more users were affected than it was initially estimated: and they are counted in millions.
Pelican cases are a good choice for protecting your pricey gear while flying. But one such case recently caused a series of unpleasant situations for photographer Antonio Kuilan. The airport security stopped him three times at Houston Airport, and all three times he raised suspicion because of the Pelican case in which he carried his gear. We spoke to Antonio about this case to hear more, and we learned that he wasn’t the only one who had this experience.
According to a report on The Information Instagram has experienced a pretty major security bug which allowed user passwords to be displayed in plain text. The issue arose, ironically, over the feature which allows users to see exactly what personal data Instagram has collected about them. Yes, the “Download your data” feature could potentially let anybody download your data, if you access the feature on a public computer, thanks to the bug.
The Download your Data feature was introduced last April in order to comply with new European data privacy regulations (the GDPR) as well as to keep users around the world, who are becoming more and more security & privacy conscious since the Facebook revelations over the last couple of years.
Last night, I received an email from EyeEm about a “data security incident.” 22 million accounts have been compromised, exposing the users’ names, email addresses, and encrypted versions of passwords. However, EyeEm wasn’t the only victim of this data breach. It’s the same one that hit 500px, and it also affected 25 million users of Animoto.
This morning, I received an email from 500px requiring that I change my password after they became aware of a “security issue” on the site on Friday 8th February. This might sound like 500px is jumping on the issue quickly, however, the breach actually happened way back on July 5th, 2018.
After detecting the breach, 500px says that they “immediately launched a comprehensive review of our systems” to figure out exactly what happened and what the impact was. They say that have been working with third-party security experts and are coordinating with law enforcement authorities.
A man from East Jordan, Michigan has recently captured a photo that shows an angel hovering above his truck. Well, at least he claims it’s an angel. The photo went viral and brought him lots of attention and interviews for different publications. But of course, not everyone is convinced that the photo truly is a miracle. Some would say that it’s nothing but a moth.
This morning, along with roughly 330 million other people, I received an email from Twitter strongly suggesting that I change my password. They’re also advising that I change it on any other website I’ve ever used that password. The reason is that Twitter appears to be accidentally storing passwords in plain text. And they seem to have no idea how long it’s been happening.
On Thursday afternoon, a TV crew was arrested at Newark Liberty International Airport for trying to sneak a fake bomb in their carry-on luggage. They are reportedly working for CNBC and they wanted to pull a prank to film it for a show. However, they were quickly busted and they are now facing charges and up to $13,000 in fines.
It seems that crowdsourcing is not beyond intelligence agencies. At least, according to a leaked memo from U.S. Immigration and Customs Enforcement (ICE). In it, they say that the Special Agent in Charge Intelligence Program (SIP) Los Angeles have “moderate confidence” that DJI is providing critical infrastructure and law enforcement data to China.
They also say that they have “high confidence” that they are “selectively targeting government and privately owned entities within these sectors to expand its ability to collect and exploit sensitive U.S. data”. It all sounds a bit James Bond to me, but this isn’t the first time DJI’s been in the middle of security controversy. Nor even the first time this year.
If you happen to be locked out of your Facebook account, you may soon need to upload a selfie to prove your identity and be able to log back in. As a matter of fact, it seems that Facebook has already started implementing this captcha. In case they notice suspicious activity on your account, you will be asked to “upload a photo of yourself that clearly shows your face.” After it’s verified, you will be allowed to log back in.