{"id":5741,"date":"2018-10-02T11:15:47","date_gmt":"2018-10-02T15:15:47","guid":{"rendered":"http:\/\/ncjolt.org\/?p=5741"},"modified":"2020-06-04T20:52:30","modified_gmt":"2020-06-04T20:52:30","slug":"fifty-million-facebook-accounts-compromised-way-keep-data-safe","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/fifty-million-facebook-accounts-compromised-way-keep-data-safe\/","title":{"rendered":"Fifty Million Facebook Accounts Compromised: Is There any way to Keep our Data Safe?"},"content":{"rendered":"<p><span lang=\"EN\">Another major data breach was reported on Friday, September 28<sup>th<\/sup>, when Facebook disclosed that nearly fifty million user profiles had been <\/span><span lang=\"EN\"><a href=\"https:\/\/lawlibproxy2.unc.edu:2147\/technology\/articles\/1087537\/facebook-breach-leaves-50m-user-accounts-exposed\">hacked<\/a><\/span><span lang=\"EN\">. Facebook\u2019s investigation is in the initial stages, and thus details are sparse, but the following is known. Hackers were able to steal \u201caccess tokens,\u201d which are essentially digital keys that allow users to stay logged into Facebook without having to re-enter their password. The hackers were able to steal the access tokens through a weakness in the code related to Facebook\u2019s \u201cView As\u201d feature. The View As feature allows users to visualize how their profile appears to other users, such as particular friends, friends of friends, or the general public. Once equipped with these access tokens, hackers are able to take over user\u2019s accounts, and although not verified yet, possibly access much of a user\u2019s profile <\/span><span lang=\"EN\"><a href=\"https:\/\/lawlibproxy2.unc.edu:2147\/technology\/articles\/1087537\/facebook-breach-leaves-50m-user-accounts-exposed\">data<\/a><\/span><span lang=\"EN\">. <\/span><br \/>\n<span lang=\"EN\">News of this significant data breach at Facebook would be unsettling if it was an anomaly, but, when viewed in context of the long line of major data breaches over recent years, it is truly chilling. Over the last decade there have been major data breaches in both the private and public sector. A few of the most significant are described below. <\/span><br \/>\n<span lang=\"EN\">Concerning the public sector, a few years ago there was a data breach in the United States Office of Personal Management (OPM). The OPM is essentially the <\/span><span lang=\"EN\"><a href=\"https:\/\/www.wired.com\/2016\/10\/inside-cyberattack-shocked-us-government\/\">human resources office<\/a><\/span><span lang=\"EN\"> for the federal government and therefore contains extremely sensitive data on approximately <\/span><span lang=\"EN\"><a href=\"https:\/\/www.wired.com\/2016\/10\/inside-cyberattack-shocked-us-government\/\">twenty million federal employees<\/a><\/span><span lang=\"EN\">, such as security clearances, personal finances, and psychiatric records. The private sector has faced even more significant data breaches. Two of the most significant are the Yahoo breach and the Equifax breach. In the Yahoo breach, which is <\/span><span lang=\"EN\"><a href=\"https:\/\/www.cnbc.com\/2017\/10\/04\/how-the-yahoo-hack-stacks-up-to-previous-data-breaches.html\">the largest in history<\/a><\/span><span lang=\"EN\">, three billon user accounts were compromised. The <\/span><span lang=\"EN\"><a href=\"https:\/\/www.consumer.ftc.gov\/blog\/2017\/09\/equifax-data-breach-what-do\">Equifax breach<\/a><\/span><span lang=\"EN\"> compromised Social Security numbers, birth dates, addresses, and, in some cases, driver\u2019s license numbers for one hundred thirty-four million consumers. <\/span><br \/>\n<span lang=\"EN\">The data breaches listed above are some of the biggest and most damaging in recent years, but they are not the alone. Other <\/span><span lang=\"EN\"><a href=\"https:\/\/www.csoonline.com\/article\/2130877\/data-breach\/the-biggest-data-breaches-of-the-21st-century.html\">significant data breaches<\/a><\/span><span lang=\"EN\"> have occurred at such places as Adult Friend Finder, Anthem, eBay, JP Morgan Chase, Home Depot, Target, Adobe, Sony\u2019s PlayStation Network, RSA Security, Heartland Payment Systems, TJX Companies, and Facebook. In short, it is likely that virtually every individual in America has had their personal data compromised in some way. <\/span><br \/>\n<span lang=\"EN\">The recent Facebook data breach, especially viewed in the context of past data breaches, is a stark reminder that all individuals must take proactive steps to protect their data. Although at least some of your data has likely been compromised at this point it, this is no excuse for handing over the rest of your data willingly. There are countless steps that can be taken to protect your data, but there are at least four steps that every individual should take. First, not only should you password protect everything possible, but you should also use complex passwords that are different for each login. Considering the number of logins each individual has in today\u2019s world, you should consider obtaining a <\/span><span lang=\"EN\"><a href=\"https:\/\/www.techlicious.com\/tip\/simple-ways-to-protect-your-privacy\/\">password manager<\/a><\/span><span lang=\"EN\"> app in which all your passwords and logins can be securely stored. Second, whenever possible, use two factor authentication. Two factor authentication requires a second form of authentication (other than a password) to access an account and ensures your data is secure even if a hacker compromises your <\/span><span lang=\"EN\"><a href=\"https:\/\/www.techlicious.com\/tip\/simple-ways-to-protect-your-privacy\/\">login credentials<\/a><\/span><span lang=\"EN\">. Third, always connect to a <\/span><span lang=\"EN\"><a href=\"https:\/\/www.techlicious.com\/tip\/simple-ways-to-protect-your-privacy\/\">secure password protected Wi-Fi<\/a><\/span><span lang=\"EN\"> network. If you must use a public Wi-Fi network, do so through a Virtual Private Network (VPN). Fourth, consider <\/span><span lang=\"EN\"><a href=\"https:\/\/www.usatoday.com\/story\/money\/2018\/09\/06\/equifax-data-breach-how-freeze-your-credit-report\/1136955002\/\">freezing your credit<\/a><\/span><span lang=\"EN\">. Freezing your credit stops transactions that require credit approval from going through, unless you unfreeze your credit prior to the transaction. <\/span><br \/>\n<span lang=\"EN\">The above steps will help ensure that your personal data will be protected from data breaches, but they are, unfortunately, not enough. Currently consumers do not have adequate tools at their disposal to more fully protect their data. Nor is the current regulatory scheme sufficient to protect against data breaches. Therefore, it is time for lawmakers to step in. Lawmakers should tackle data protection through a two-pronged approach. Under the first prong, lawmakers should set strict security standards for managing personal data that all public companies and governmental agencies must follow. This legislation could build on current legislation such as the<\/span><span lang=\"EN\"><a href=\"https:\/\/www.recode.net\/2017\/8\/1\/16070996\/congress-internet-of-things-cybersecurity-laws\"> Internet of Things CyberSecurity Improvement Act of 2017<\/a><\/span><span lang=\"EN\">, which aims to set security standards for web connected products that are sold to federal agencies. Under the second prong, lawmakers must give individuals effective tools for combatting misappropriation of their data once it has been compromised. An example of this prong was put into effect recently in new financial legislation, which required that individuals could freeze <\/span><span lang=\"EN\"><a href=\"https:\/\/www.nytimes.com\/2018\/09\/14\/your-money\/credit-freeze-free.html\">their credit for free<\/a><\/span><span lang=\"EN\">. Lawmakers will never be able to stop all data breaches, but smart legislation combined with proactive individuals will go a long way in curbing both the number and effect of data breaches. <\/span><br \/>\n<span lang=\"EN\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another major data breach was reported on Friday, September 28th, when Facebook disclosed that nearly fifty million user profiles had been hacked. Facebook\u2019s investigation is in the initial stages, and thus details are sparse, but the following is known. Hackers were able to steal \u201caccess tokens,\u201d which are essentially digital keys that allow users to <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/fifty-million-facebook-accounts-compromised-way-keep-data-safe\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":5742,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5741"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=5741"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5741\/revisions"}],"predecessor-version":[{"id":6912,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/5741\/revisions\/6912"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/5742"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=5741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=5741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=5741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}