Monday, April 28, 2025
HomeSecurity NewsFacebook New Security Test Forced User to Upload Your clear photo to...

Facebook New Security Test Forced User to Upload Your clear photo to catch suspicious Activities

Published on

SIEM as a Service

Follow Us on Google News

Facebook now performing a new kind of captcha to verify the user to find Whether you are real human or bot for every user who all are crossing the facebook behavior access limit.

Each and everyday facebook facing millions and millions of unusual behavior and suspicious activities which cause many abusing events to normal Facebook users.

This Unsuspicious event with various part of the facebook including, sending a friend request, setting ads, share the links in group and page, creating and editing ads and cleating accounts.

- Advertisement - Google News

Also Read:  Facebook’sImage Removal Vulnerability allows Users to Delete any Photos

Few months Before facebook released new tool to prevent suicide and online well being to Prevent the people who may have in Risky Situation

This new identity verification system is the social network’s latest attempt to curb the spread of artificially intelligent “bots” – software applications that run automated tasks over the internet.

Facebook

prevent users from suspicious activities, this new security implementation by Facebook’s new system requires users to upload a photo of themselves that clearly shows their face, to prove they are who they say they are.

According to Wired, The process is automated, including identifying suspicious activity and checking the photo. To determine if the account is authentic, Facebook looks at whether the photo is unique.

A Recent Twitter users experience this suspicioius activities verification that says,“Please upload a photo of yourself which clearly shows your face.When you send us a photo, we’ll check it and then permanently delete it from our servers.”

https://twitter.com/flexlibris/status/935635282564734977

Many Facebook users shared their experience with this security verification and some time it rejected their images and makes user get frustrated.

The Facebook spokesperson said the photo test is one of several methods, both automated and manual, used to detect suspicious activity.

Facebook already relesed several projects to prevent a user that asked users to upload nude photos to Facebook Messenger, as part of an effort to prevent revenge porn.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SAP NetWeaver 0-Day Flaw Actively Exploited to Deploy Webshells

SAP disclosed a critical zero-day vulnerability, identified as CVE-2025-31324, in its NetWeaver Visual Composer component. This...

Windows 11 25H2 Expected to Launch with Minor Changes

Microsoft is quietly preparing the next update to its flagship operating system, Windows 11 25H2,...

China Claims U.S. Cyberattack Targeted Leading Encryption Company

China has accused U.S. intelligence agencies of carrying out a sophisticated cyberattack against one...

Critical FastCGI Library Flaw Exposes Embedded Devices to Code Execution

A severe vulnerability (CVE-2025-23016) in the FastCGI library-a core component of lightweight web server...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...