Facebook’s latest app data bug exposed the private photos of 6.8m users

A New week and a data breach for Face book it effect up 6.8 Million user the problem give Mobile Apps access to all your photo.

The bug was live in September before being fixed, and Facebook could be in trouble with EU regulators for waiting so long to report it. If you’re one of the users that might have been affected, you should see an alert the next time you log in.

This show that any company can lose data, here in the uk any size company can be fine under the GDPR act if it dose not take care of user data. If you need help you can speak to one of our GDPR speiclets book one now .

    Your Name (required)

    Your Email (required)

    Phone Number

    Your Message

     

    Rootkit

    A rootkit is malicious malware designed to remotely access or control a computer without being detected by users or security software programs. Using rootkits, cybercriminals can execute files,steal information, modify configurations, alter software, or even install more malware. Rootkits can be included in software applications and can enter a computer through phishing attacks or through a security vulnerability. A rootkit is very difficult to remove, so prevention is key.

    Keylogger

    Keylogger malware is a dangerous threat to a PC user’s privacy. It will track your keystrokes and save them in a hidden file on your computer. After a certain amount of time, the file is sent to the hacker automatically, who will use the keystroke data to get your passwords or personal and business information. Keyloggers often enter computer systems as trojans, disguised as a free or useful app or download,and can install itself when users are clicking and browsing the Internet or downloading software.

    Worms

    Worms are a type of malware that uses a computer network to replicate itself and spread. They are self-replicating and unlike viruses,do not need human action to quickly spread through your computer, or even an entire network.Worms often gain entry to a computer through a security vulnerability or weakness.

    Trojans

    Trojans behave like a Trojan horse in Greek mythology. The soldiers hid inside of the horse to penetrate the city wall of Troy and waited until nightfall to attack. A Trojan works in a similar way. It disguises itself as a trusted software program or application to get into your system and attack later. Trojans offer disguise themselves as a computer game download from a hijacked website.