• Guest
HabraHabr
  • Main
  • Users

  • Development
    • Programming
    • Information Security
    • Website development
    • JavaScript
    • Game development
    • Open source
    • Developed for Android
    • Machine learning
    • Abnormal programming
    • Java
    • Python
    • Development of mobile applications
    • Analysis and design of systems
    • .NET
    • Mathematics
    • Algorithms
    • C#
    • System Programming
    • C++
    • C
    • Go
    • PHP
    • Reverse engineering
    • Assembler
    • Development under Linux
    • Big Data
    • Rust
    • Cryptography
    • Entertaining problems
    • Testing of IT systems
    • Testing Web Services
    • HTML
    • Programming microcontrollers
    • API
    • High performance
    • Developed for iOS
    • CSS
    • Industrial Programming
    • Development under Windows
    • Image processing
    • Compilers
    • FPGA
    • Professional literature
    • OpenStreetMap
    • Google Chrome
    • Data Mining
    • PostgreSQL
    • Development of robotics
    • Visualization of data
    • Angular
    • ReactJS
    • Search technologies
    • Debugging
    • Test mobile applications
    • Browsers
    • Designing and refactoring
    • IT Standards
    • Solidity
    • Node.JS
    • Git
    • LaTeX
    • SQL
    • Haskell
    • Unreal Engine
    • Unity3D
    • Development for the Internet of things
    • Functional Programming
    • Amazon Web Services
    • Google Cloud Platform
    • Development under AR and VR
    • Assembly systems
    • Version control systems
    • Kotlin
    • R
    • CAD/CAM
    • Customer Optimization
    • Development of communication systems
    • Microsoft Azure
    • Perfect code
    • Atlassian
    • Visual Studio
    • NoSQL
    • Yii
    • Mono и Moonlight
    • Parallel Programming
    • Asterisk
    • Yandex API
    • WordPress
    • Sports programming
    • Lua
    • Microsoft SQL Server
    • Payment systems
    • TypeScript
    • Scala
    • Google API
    • Development of data transmission systems
    • XML
    • Regular expressions
    • Development under Tizen
    • Swift
    • MySQL
    • Geoinformation services
    • Global Positioning Systems
    • Qt
    • Dart
    • Django
    • Development for Office 365
    • Erlang/OTP
    • GPGPU
    • Eclipse
    • Maps API
    • Testing games
    • Browser Extensions
    • 1C-Bitrix
    • Development under e-commerce
    • Xamarin
    • Xcode
    • Development under Windows Phone
    • Semantics
    • CMS
    • VueJS
    • GitHub
    • Open data
    • Sphinx
    • Ruby on Rails
    • Ruby
    • Symfony
    • Drupal
    • Messaging Systems
    • CTF
    • SaaS / S+S
    • SharePoint
    • jQuery
    • Puppet
    • Firefox
    • Elm
    • MODX
    • Billing systems
    • Graphical shells
    • Kodobred
    • MongoDB
    • SCADA
    • Hadoop
    • Gradle
    • Clojure
    • F#
    • CoffeeScript
    • Matlab
    • Phalcon
    • Development under Sailfish OS
    • Magento
    • Elixir/Phoenix
    • Microsoft Edge
    • Layout of letters
    • Development for OS X
    • Forth
    • Smalltalk
    • Julia
    • Laravel
    • WebGL
    • Meteor.JS
    • Firebird/Interbase
    • SQLite
    • D
    • Mesh-networks
    • I2P
    • Derby.js
    • Emacs
    • Development under Bada
    • Mercurial
    • UML Design
    • Objective C
    • Fortran
    • Cocoa
    • Cobol
    • Apache Flex
    • Action Script
    • Joomla
    • IIS
    • Twitter API
    • Vkontakte API
    • Facebook API
    • Microsoft Access
    • PDF
    • Prolog
    • GTK+
    • LabVIEW
    • Brainfuck
    • Cubrid
    • Canvas
    • Doctrine ORM
    • Google App Engine
    • Twisted
    • XSLT
    • TDD
    • Small Basic
    • Kohana
    • Development for Java ME
    • LiveStreet
    • MooTools
    • Adobe Flash
    • GreaseMonkey
    • INFOLUST
    • Groovy & Grails
    • Lisp
    • Delphi
    • Zend Framework
    • ExtJS / Sencha Library
    • Internet Explorer
    • CodeIgniter
    • Silverlight
    • Google Web Toolkit
    • CakePHP
    • Safari
    • Opera
    • Microformats
    • Ajax
    • VIM
  • Administration
    • System administration
    • IT Infrastructure
    • *nix
    • Network technologies
    • DevOps
    • Server Administration
    • Cloud computing
    • Configuring Linux
    • Wireless technologies
    • Virtualization
    • Hosting
    • Data storage
    • Decentralized networks
    • Database Administration
    • Data Warehousing
    • Communication standards
    • PowerShell
    • Backup
    • Cisco
    • Nginx
    • Antivirus protection
    • DNS
    • Server Optimization
    • Data recovery
    • Apache
    • Spam and antispam
    • Data Compression
    • SAN
    • IPv6
    • Fidonet
    • IPTV
    • Shells
    • Administering domain names
  • Design
    • Interfaces
    • Web design
    • Working with sound
    • Usability
    • Graphic design
    • Design Games
    • Mobile App Design
    • Working with 3D-graphics
    • Typography
    • Working with video
    • Work with vector graphics
    • Accessibility
    • Prototyping
    • CGI (graphics)
    • Computer Animation
    • Working with icons
  • Control
    • Careers in the IT industry
    • Project management
    • Development Management
    • Personnel Management
    • Product Management
    • Start-up development
    • Managing the community
    • Service Desk
    • GTD
    • IT Terminology
    • Agile
    • Business Models
    • Legislation and IT-business
    • Sales management
    • CRM-systems
    • Product localization
    • ECM / EDS
    • Freelance
    • Venture investments
    • ERP-systems
    • Help Desk Software
    • Media management
    • Patenting
    • E-commerce management
    • Creative Commons
  • Marketing
    • Conferences
    • Promotion of games
    • Internet Marketing
    • Search Engine Optimization
    • Web Analytics
    • Monetize Web services
    • Content marketing
    • Monetization of IT systems
    • Monetize mobile apps
    • Mobile App Analytics
    • Growth Hacking
    • Branding
    • Monetize Games
    • Display ads
    • Contextual advertising
    • Increase Conversion Rate
  • Sundry
    • Reading room
    • Educational process in IT
    • Research and forecasts in IT
    • Finance in IT
    • Hakatonas
    • IT emigration
    • Education abroad
    • Lumber room
    • I'm on my way

New vulnerability in Facebook leads to leakage of users' personal data.

New vulnerability in Facebook leads to leakage of users' personal data. Image: Pexels [/i] 3r3108.  3r3119. 3r3108.  3r3119. Information Security Researchers found Facebook social vulnerability - this error could lead to leaks of confidential information about users and their friends. An error was found in the social network search function.
3r3111. 3r3108.  3r3119. 3r3108.  3r3119.

What is the problem r3r388. 3r3108.  3r3119. According to researcher Ron Masas from Imperva, the page on which search results are displayed includes iFrame-related items. The final URLs of these iFrame are not protected from cross-site request forgery (CSRF) cross-site request forgery attacks. 3r3108.  3r3119. 3r3108.  3r3119. To exploit a vulnerability, an attacker needs to trick users into visiting a special site. It is important that the user is logged in to your Facebook profile. When any click on the web page in the background, jаvascript code will be executed. This code opens a new tab with the Facebook URL, in which a predefined request is executed in order to get the information the attacker needs. 3r3108.  3r3119. 3r3108.  3r3119.
3r3338.
3r340.
3r3108.  3r3119. 3r3108.  3r3119. This attack can be used both to search for “photo from vacation” information and to extract more sensitive data, including: 3r3108.  3r3119. 3r3108.  3r3119.
 3r3119. 3r373. whether the user has friends with a specific name or a keyword in the profile name;
 3r3119. 3r373. which pages the user liked and the groups he belongs to;
 3r3119. 3r373. Does he have friends subscribed to a specific page?
 3r3119. 3r373. availability of photos from certain locations or countries;
 3r3119. 3r373. whether the user has posted entries containing specific keywords;
 3r3119. 3r373. Does he have friends of a particular religion?
 3r3119. 3r373. etc.
 3r3119. 3r376. 3r3108.  3r3119. Thus, the vulnerability reveals sensitive user data, even if they set privacy settings that prohibit outsiders to show such information. 3r3108.  3r3119. 3r3108.  3r3119. The process can be repeated many times without the need to open new tabs. As a result, this attack is the most dangerous for mobile users - it is more difficult for them to track the opening of new tabs. 3r3108.  3r3119. 3r3108.  3r3119.
How to protect yourself

3r3108.  3r3119. Researchers turned to Facebook, and the company has already removed the vulnerability. Social network engineers added protection against CSRF attacks. 3r3108.  3r3119. 3r3108.  3r3119. When development is put on stream due to the high demand for services and products, more and more developers are implementing continuous integration and delivery (CI /CD) processes. An integral part of CI /CD is ensuring the security of the software being developed. It is especially important to identify and eliminate vulnerabilities accurately and on the job. However, in practice, not everything is so simple. 3r3108.  3r3119. 3r3108.  3r3119. Many people mistakenly believe that analyzing the quality of the code is enough to check the software, including the security risks. And those who understand that this is not the case, and resorts to the security analysis tools, are faced with the problem of verification of vulnerabilities. It is usually performed manually, and given the fact that the number of vulnerabilities can reach hundreds and thousands, the effectiveness of the CI /CD process and the desirability of supporting it are a big question. 3r3108.  3r3119. 3r3108.  3r3119.
On Thursday, [b] November 22 at 2:00 p.m. , an expert of application protection systems at Positive Technologies Alexei Zhukov will hold a free webinar. In its course, you will learn how to ensure that in conditions of continuous processes, large volumes and burning deadlines, security defects do not go unnoticed, and their verification does not become a bottleneck. Alexey will talk about how to intelligently automate the process of ensuring the security of software and improve the efficiency of performing basic tasks. The webinar will be useful for DevOps developers and experts. 3r3108.  3r3119. 3r3108.  3r3119. To participate in the webinar you need 3r3-3110. register
. 3r33112.
3r3119. 3r3119. 3r3119. 3r3117. ! function (e) {function t (t, n) {if (! (n in e)) {for (var r, a = e.document, i = a.scripts, o = i.length; o-- ;) if (-1! == i[o].src.indexOf (t)) {r = i[o]; break} if (! r) {r = a.createElement ("script"), r.type = "text /jаvascript", r.async =! ? r.defer =! ? r.src = t, r.charset = "UTF-8"; var d = function () {var e = a.getElementsByTagName ("script")[0]; e.parentNode.insertBefore (r, e)}; "[object Opera]" == e.opera? a.addEventListener? a.addEventListener ("DOMContentLoaded", d,! 1): e.attachEvent ("onload", d ): d ()}}} t ("//mediator.mail.ru/script/2820404/"""_mediator") () (); 3r3118. 3r3119.

It may be interesting

  • Comments
  • About article
  • Similar news
mubashirkhatri 14 June 2020 11:23
This particular is usually apparently essential and moreover outstanding truth along with for sure fair-minded and moreover admittedly useful My business is looking to find in advance designed for this specific useful stuffs… AutoBuzz

weber

Author

21-11-2018, 16:32

Publication Date

Development / Information Security

Category
  • Comments: 1
  • Views: 539
Landing main features in 2019
A little about Gulp
NASA Announces New Moon Flight
Tesla (TSLA) 3Q2018 report
How we taught the neural network to
Friday's Skillbox webinars: freelancing
Write a comment
Name:*
E-Mail:


Comments
Global Dezigns is a Website Development Company in Karachi, Providing services of
website design in karachi
. We are delivering the best partnership across Pakistan. provides a complete range of web development services including web applications, website hosting and maintenance, domain registration, on-page search engine optimization, and website integration with social media platforms such as Facebook, Twitter, LinkedIn, Google Maps, and Google Local Directory. We believe we are well placed to take our knowledge and expertise to the logical next level with the latest web standards.  
  Show/hide text
https://www.globaldezigns.com/



Yesterday, 22:45

mike tomlin

This blog is really great. The information here will surely be of some help to me. Thanks!.mastering physics

Yesterday, 17:57

raymond weber

Coinyspace is the cryptocurrency community and trading forum where members can find any contributors of crypto ecosystem like currencies, exchanges & merchants. Check Out: Bitcoin Merchants
Yesterday, 16:57

noorseo

This is a great high resolution screen which you have shared for the users. Making a website is not an easy task but managing a good website is really a hard work. As far as this website is concerned, I am very happy.https://19216801.1
Yesterday, 16:01

nushra45

i'm satisfied to deem this make recognized Very beneficial for me, as it contains lot of advice. I usually favor to buttonhole The excellent and glad i found this count number in you assertion. thanks Subliminal Hypnosis
Yesterday, 14:56

jahangirkhatri

Adv
Website for web developers. New scripts, best ideas, programming tips. How to write a script for you here, we have a lot of information about various programming languages. You are a webmaster or a beginner programmer, it does not matter, useful articles will help to make your favorite business faster.

Login

Registration Forgot password