Update: Symantec says Facebook site leaked information
IDG News Service -
A programming bug on Facebook's website may have accidentally given advertisers and others access to a treasure trove of personal information, according to security researchers at Symantec.
According to Symantec, certain Facebook applications have been inadvertently handing advertisers access tokens -- strings of numbers and letters that can be used by a browser to access Facebook accounts over the Web. "Access tokens are like the 'spare keys' granted by you to the Facebook applications," Symantec said in a blog post. "Each token or 'spare key' is associated with a select set of permissions, like reading your wall, accessing your friend's profile, posting to your wall, etc."
Users habitually grant this type of access to Facebook applications so they can do things such as write on profile walls, but by handing over these tokens to others, application developers were accidentally giving advertisers or online analytics companies a way to get at this information too.
"We estimate that over the years, hundreds of thousands of applications may have inadvertently leaked millions of tokens to third parties," Symantec said.
The tokens were leaked in referring URLs that Facebook applications passed on to advertisers and others. That shouldn't have happened.
But Facebook says there's no evidence that these tokens were ever misused -- something that would have violated Facebook developer and advertising policies. The company has "conducted a thorough investigation which revealed no evidence of this issue resulting in a user's private information being shared with unauthorized third parties," Facebook said in a statement.
Facebook opened up its social network to third-party Web developers in 2007, and they've become key to the site's phenomenal success. But security experts have said that users should be careful to only authorize Facebook apps that they really want to use.
Symantec said it's not clear whether anyone realized that this problem existed, so it's possible that nobody has taken advantage of the bug to snoop on users.
Facebook has now fixed the problem, but it could still be a big problem for users, according to Symantec. That's because these tokens may still be in circulation, stored in server log files or in other places on the Web.
One of these access tokens will keep working until the Facebook user changes his password, so Symantec said that concerned users should change their Facebook passwords, like "changing the lock" on their Facebook account.
The issue doesn't affect Facebook applications that use the newer OAUTH2.0 authentication system, Symantec said.
- NSA defends collecting data from U.S. residents not suspected of terrorist activities
- Groups fear bill would allow free flow of data between private sector and NSA
- Google's move into home automation means even less privacy
- Bill to require warrant for email searches gains ground in House
- Coming soon to a fridge near you -- targeted ads
- Snowden leaks prompt tech firms to tout privacy, transparency policies
- License reader lawsuit can be heard, appeals court rules
- Is EU's 'right to be forgotten' really the 'right to edit the truth'?
- Tails 1.0: A bootable Linux distro that protects your privacy
- Privacy jitters derail controversial K-12 big data initiative
- Securing Mobility, From Device to Network At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Planning for Mobile Success Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time,...
- The Challenges and Opportunities of Mobile Application Development Nearly all business users now demand mobile devices--their own or company-owned--along with anywhere access to corporate applications and data. What turns mobile devices...
- Gartner MarketScope for Group Video Systems The Gartner "MarketScope for Group Video Systems" evaluates 7 group video system vendors based on 6 customer-focused criteria such as customer experience, market...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!