Facebook suffers an attack and data from 50 million users is leaked

Can you make it worse Facebook? We no longer know if it is a very strong smear campaign by the international media against the ubiquitous Facebook of Mark Zuckerberg or that indeed a company of such magnitude and based on the Internet is capable of being so extremely incompetent.

In theory - we say in theory because with Facebook you never know what an attack or an intentional leak is - the data of more than fifty million Facebook users has been compromised in the last few hours. The company and the authorities are already investigating the origin of the attack and the scope of privacy.

The company that owns WhatsApp and Instagram was at the center of criticism yesterday after it was learned that it filters users' advertising based on their phone numbers. We now understand why there is so much interest in staying with WhatsApp and sharing your data - you already know that WhatsApp has always based its operation on our contact list and our phone number. This cyber attack has come to light thanks to The New York Times and took place earlier this week even though we met him a few hours ago.

Cybercriminals could have exploited a security flaw and joins the 90 million users affected by the scandal of Cambridge Analytica. Meanwhile Facebook has closed the session of 90 million users who will have to log in again on their devices, this will be more or less the mechanism that we can use to know if our data has been compromised or not due to the security breach. It is clear that while Instagram does not stop uploading, Facebook is plummeting both in users and in the sentiment that the social network generates in the public sphere.


You are interested in:
Facebook Messenger allows you to see who has read your messages
Follow us on Google News

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.