By continuing to use the site or forum, you agree to the use of cookies, find out more by reading our GDPR policy

Some 400 apps on Android and Apple have been stealing login information, the platform’s owner says The personal data of at least 1 million Facebook users could have been stolen by certain apps on Apple and Android, the platform’s owner, Meta, has warned. Around 400 malicious applications, distributed through Google Play and the App Store, have been stealing people’s login information, the company’s security team said on Friday.

They posed as harmless tools such as photo editors, games, VPN services, and other things to lure users into downloading them. The apps then asked people to ‘log in with Facebook’ and forwarded their usernames and passwords to the perpetrators as soon as they were entered. This data could potentially be used by the attackers to gain full access to people’s accounts and send messages to their friends lists or obtain private information.

Meta has said it was not aware of the exact number of users affected, as this information is known to Apple and Google. The company is “being kind of deliberately overcautious and notifying about 1 million users across our entire platform that they may have been exposed to applications like this,” Meta’s director of threat disruption, David Agranovich, stated. “That doesn’t mean that they were compromised, just that we think that they may have been exposed to one of these applications,” he added.
Google and Apple say they have already removed the apps mentioned in Meta’s report. Apps sold through their online stores are carefully vetted, but some malicious software still makes it through. Meta has advised users to be cautious and carefully examine what they download. “If a flashlight application is requiring you to log in with Facebook before it gives you any flashlight functionality, it’s probably something to be suspicious of,” Agranovich said.
Source by David Agranovich, Pic the Net

Social media giant is spying on conservative users and snitching to the feds. It’s been revealed by sources within the US Department of Justice that direct messages sent through Facebook by American users, along with public postings, have been rigorously monitored, and reported to the Federal Bureau of Investigation (FBI) if they express anti-government, anti-authority views, or if they question the legitimacy of the November 2020 presidential election’s outcome.

Witch hunt on the web
Under the terms of a secret collaboration agreement with the FBI, a Facebook staffer has, over the past 19 months, been red-flagging content they consider to be “subversive” and immediately transmitting it to the Bureau’s domestic terrorism operational unit, without the FBI having filed a single subpoena – outside the established US legal process, without probable cause, and in breach of the First Amendment, in other words.

Just as shockingly, these intercepted communications were then provided as leads and tips to FBI field offices across the US, which in turn secured subpoenas in order to officially obtain the private conversations that they already possessed, and thus cover up the fact the material had been obtained extra-legally. Facebook invariably complied with these subpoenas, and would send back “gigabytes of data and photos” within an hour, suggesting the content sought was already packaged and awaiting legal confirmation before distribution.

Read the whole story on our Social Media Forum Board

Microsoft is continuously rolling out the Windows 11 2022 update, but more problems unravel as it reaches more users. One of the biggest unresolved issues now has something to do with Remote Desktop clients. According to those affected, installing the update caused their Remote Desktop on Windows 11 system to fail to connect (or connect only to disconnect or freeze later). “All of our Remote Desktop Users using Windows 11 are having problems connecting to Remote Desktop after installing this update. It just hangs at connecting,” reported an Insider named Jeff Cleath on the Microsoft Community page. “We have found that there is a bug in the Remote Desktop client so that it is only trying the UDP connection and not trying the TCP connection. We only allow the port 443 connection through on our firewall.” Users in the community found a workaround to end the negative impact of Windows 11 2022 on Remote Desktop clients. Apparently, it is still suggested to roll back the update. Nonetheless, for those who still wish to have it, Cleath suggests adding a specific registry setting to allow the Remote Desktop Connection to work, which involves disabling UDP connections on clients. To do so, you need to go to HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services\Client using the Registry Editor. From there, affected users need to right-click and create a new DWORD entry named fClientDisableUDP and change its value to 1. To complete the process, a restart is necessary. Many users claim this process quickly resolved the issue. On the other hand, users can also resort to the Turn Off UDP On Client policy option without restarting their machines. Follow the path Computer Configuration > Administration Templates > Windows Components > Remote Desktop Services > Remote Desktop Connection Client via the Group Policy Editor. While this suggestion seems to work for many affected users, some are still doubtful about it. “My understanding is that changing that registry to 1 would actually not use the UDP,” one user wrote. “Would anyone know whether this would cause any “unreliability” in the RemoteApp connection if it is left turned off?” “From my limited understanding, I think UDP allows the RDP connection to remain connected even if it doesn’t get an acknowledgment from the remote server, as TCP requires a full handshake between client and server before it does anything,” another user commented. “So disabling UDP just means that it only uses TCP to connect and that it needs a stable connection to the server at all times to maintain the handshake.” Cleath, the Insider who suggested the remedy, on the other hand, says using it on his end pose no problems. “I have heard from others that changing this registry could lead to performance issues with file downloads and video from Remote Desktop environment, especially with poor or long distance connections,” Cleath said. “I personally have been using this setting for about 4 months and have had no issues. I have very good internet connectivity remotely and am only about 40 miles from the server environment.” As of now, Microsoft still doesn’t have any official fix available for the issue though the company is already aware of the situation. In the meantime, affected users can try the above suggestions or wait for the official solution from Microsoft. For more visit OUR FORUM.