In April 2016, Cybersecurity firm Palo Alto Networks (NASDAQ: PNO) released a report on how hackers changed Facebook passwords and users' personal information. The report found that more than half of the hacked accounts were accessed with brute force attacks, which is when hackers try to guess the password based on the email address and other information associated with the Facebook account.
The report also found that more than half of the attacks resulted in the hacker gaining access to users' personal information, such as their date of birth, credit card numbers, bank account, and IDs. Others include name, phone number, job title, relationship status, hometown and email.
Palo Alto Networks found that these attacks were carried out using tools such as the password reset tool and brute force password cracking. And most of the people who had their Facebook information stolen included accounts on the social networking site, a Gmail account, a Hotmail account and a LinkedIn account.
In 2012, the company was very successful in China. But due to the Chinese government's unofficial ban on it and the subsequent crackdown on the use of hacking services in China, it was forced to close, and its resources were sold to another Chinese company. As a result, the website was forced to shut down.
It's not that unusual for a honeypot victim to be lulled into a false sense of security as a high-profile target. In a truly targeted attack, the hackers know precisely who they're after, and the honeypots can serve as a relatively inexpensive way to test the security of someone's online accounts. Even if the honeypots aren't hacked, they can serve as a useful way to see how security measures work in practice. Here's how the honeypot concept works in a relatively simple way.
Meanwhile, Apple says that those who have already activated the Messages app on their iPhone, iPad, iPod touch and Mac will be able to send and receive messages from other Apple users who have Messages activated, regardless of device.
To help protect users from unwanted texts and messages, Apple's App Store Review team has implemented a new system called Apple's TextSecure. So far, the company has made it available to users of its devices and services, including iPhone, iPad, iPod touch, OS X, and Apple Watch. The company says this is the first time that Apple has offered a way for someone to protect their iPhone, iPad, iPod touch, and Mac from unwanted text messages and other scams.