Skip to main content

Facebook Watching Instagram Users Through Cameras

Facebook Accused of Watching Instagram Users Through Cameras

Source:- bloomberg.com

Facebook Inc. is again being sued for allegedly spying on Instagram users, this time through the unauthorized use of their mobile phone cameras.

The lawsuit springs from media reports in July that the photo-sharing app appeared to be accessing iPhone cameras even when they weren’t actively being used.

Facebook denied the reports and blamed a bug, which it said it was correcting, for triggering what it described as false notifications that Instagram was accessing iPhone cameras.

In the complaint filed Thursday in federal court in San Francisco, New Jersey Instagram user Brittany Conditi contends the app’s use of the camera is intentional and done for the purpose of collecting “lucrative and valuable data on its users that it would not otherwise have access to.”

By “obtaining extremely private and intimate personal data on their users, including in the privacy of their own homes,” Instagram and Facebook are able to collect “valuable insights and market research,” according to the complaint.

Facebook declined to comment

In a suit filed last month, Facebook was accused of using facial-recognition technology to illegally harvest the biometric data of its more than 100 million Instagram users. Facebook denied the claim and said that Instagram doesn’t use face recognition technology.

The case is Conditi v. Instagram, LLC, 20-cv-06534, U.S. District Court, Northern District of California (San Francisco).

Comments

Popular posts from this blog

How to secure PayPal

How to secure PayPal By- Aarti Jatan Your online finances need proper protection. Learn how to secure your PayPal account. With hundreds of millions of users around the world, PayPal has long been an international leader in the electronic payments industry. But as we know, money never fails to attract fraud, especially now, with as much of life as possible taking place online. Here is what you need to do to stay safe when sending or receiving money through PayPal. How secure is PayPal? As a matter of fact, PayPal is quite a reliable platform that maintains a high level of security — and keeps improving it. Thus, the company has an official program deploying white hat hackers to unearth vulnerabilities (the so-called bug bounty), under which it has already paid out almost $4 million since 2018. The program also covers several other services owned by PayPal, such as Venmo. PayPal also treats its users’ data responsibly: It did have one reliably reported leak, in 2017, but the leak invol...

Stolen Fortnite Accounts Earn Hackers Millions Per Year

Stolen Fortnite Accounts Earn Hackers Millions Per Year More than 2 billion breached Fortnite accounts have gone up for sale in underground forums so far in 2020 alone. Hackers are scoring more than a million dollars annually selling compromised accounts for the popular Fortnite video game in underground forums. With Fortnite’s immense popularity skyrocketing over the past few years – it currently has more than  350 million global players  – the game is a lucrative target for cybercriminals. So lucrative, in fact, that 2 billion breached accounts have gone up for sale in underground forums so far in 2020 alone, according to a new report. After tallying the auction sales for several high-end and low-end Fortnite account sellers over a three month period, researchers found that on the high end, sellers averaged $25,000 per week in account sales — roughly $1.2 million per year. The market for stolen account sales is much larger than just the gaming industry…However, from our rese...

The PIN is useless in Visa contactless transactions

Academics bypass PINs for Visa contactless payments By- Aarti Jatan Researchers: "In other words, the PIN is useless in Visa contactless transactions." A team of academics from Switzerland has discovered a security bug that can be abused to bypass PIN codes for Visa contactless payments. This means that if criminals are ever in possession of a stolen Visa contactless card, they can use it to pay for expensive products, above the contactless transaction limit, and without needing to enter the card's PIN code. The attack is extremely stealthy, academics said, and can be easily mistaken for a customer paying for products using a mobile/digital wallet installed on their smartphone. However, in reality, the attacker is actually paying with data received from a (stolen) Visa contactless card that is hidden on the attacker's body. HOW THE ATTACK WORKS According to the research team, a successful attack requires four components: (1+2) two Android smartphones, (3) a special An...