Categories: InternetSecurity News

Facebook Bug Leaks 14 Million Users New Private Posts in Public by Default

A New Facebook bug allows automatically suggested around 14 Million users new posts set in public by default from May 18 to May 22.

Facebook provides a privacy setting to set the users post in various categories such as “Public” (anyone), “Friends”, or “Friends and Connections”.

Due to this Facebook’s internal Error, the post could be read by anyone can see regardless of default setting which already set by users.

For Example, when the users set their privacy setting as “Private” then they will share their post which should remain private.

But the post could be read by anyone and it doesn’t care about the user’s Default privacy setting due to this Bug.

According to CNN, Facebook posts typically default to the last “audience” a post was shared with, such as family members, friends, or friends except for their boss. That default was changed to the public for the 14 million users, but if affected users noticed, they could have manually switched the setting themselves.

This Error Occurred when Facebook tried to implement the new futures on the user’s profile, like a photo.

Since the future items are public, the suggested audience for all new posts –0 not just these items – was set to public.

Also, Facebook cleared that this bug did not impact anything people had posted before, and they could still choose their audience just as they always have.

Facebook bug has been fixed and they changed the audience back to what they’d been using before for all the affected users.

We’ve heard loud and clear that we need to be more transparent about how we build our products and how those products use your data – including when things go wrong. And that is what we are doing here. Facebook said.

Also Read:

Beware !! Chrome Spyware Extensions Stealing Facebook Data, Location and Millions of Users Browser History

3 Million Facebook Users Highly Sensitive Data Leaked by Personality App, called myPersonality in Last 4 Years

Facebook’s New Tool to Detect and Alert Website Owners About Phishing Attacks

100,000 Users Infected With the Password Stealing Malicious Chrome Extension Distributed Through Facebook

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

7 hours ago

Threat Actors Launch Active Attacks on Semiconductor Firms Using Zero-Day Exploits

Semiconductor companies, pivotal in the tech industry for their role in producing components integral to…

7 hours ago

Hackers Exploit Router Flaws in Ongoing Attacks on Enterprise Networks

Enterprises are facing heightened cyber threats as attackers increasingly target network infrastructure, particularly routers, following…

7 hours ago

Threat Actors Exploit Legitimate Crypto Packages to Deliver Malicious Code

Threat actors are using open-source software (OSS) repositories to install malicious code into trusted applications,…

7 hours ago

Tycoon 2FA Phishing Kit Uses Advanced Evasion Techniques to Bypass Endpoint Detection Systems

The notorious Tycoon 2FA phishing kit continues its evolution with new strategies designed to slip…

7 hours ago

Hands-On Labs: The Key to Accelerating CMMC 2.0 Compliance

INE Security Highlights How Practical, immersive training environments help defense contractors meet DoD cybersecurity requirements…

11 hours ago