Facebook want to increase its functionality in search engine, for that it is exposing all the public posts of users to google. Facebook recently indexed 2 trillion public posts. Now we can see posts, conversations, likes, pictures by inserting any phrases in search engine.
So on that point your public posts are available for universal search. Worlds biggest social network make it more easy by exposing posts. It just works like as Twitter and google search only. So beware that you are exposed to the world now by your posts. Lets just change settings of our profiles if we don’t want to reveal.
Step 2 : Limit the visibility of past posts
Oracle grabs Zenedge as it continues to beef up its cloud security play
With Zenedge, Oracle gets a security service to add it to its growing cloud play. In this case, the company has products to protect customers whether in the cloud, on-prem or across hybrid environments.
The company offers a range of services from web application firewalls to distributed denial of service (DDoS) attack mitigation, bot management, API management and malware prevention. In addition, they operate a Security Operations Center (SOC) to help customers monitor their infrastructure against attack. Their software and the SOC help keep watch on over 800,000 websites and networks across the world, according to information supplied by Oracle.
Oracle says it will continue to build out Zenedge’s product offerings. “Oracle plans to continue investing in Zenedge and Oracle’s cloud infrastructure services. We expect this will include more functionality and capabilities at a quicker pace,” Oracle wrote in an FAQ on the deal (.pdf) published on their website.
Just this week Oracle announced that it was expanding its automation capabilities on its Platform as a Service offerings from databases to a range of areas including security. Ray Wang, founder and principal analyst at Constellation Research says the company is a good match as it also uses automation and artificial intelligence in its solution.
“Oracle is beefing up its security offerings in the cloud. They have one of the strongest cyber security platforms,” Wang told TechCrunch. “They also have a ton of automation that fits Oracle’s theme of autonomous,” he added.
Oracle is far behind cloud rivals as it came late to the game. Just this week, the company announced plans to build a dozen data centers around the world over the next two years. They are combining an aggressive acquisition strategy and rapid data center expansion in an effort to catch up with competitors like AWS, Microsoft and Google.
Zenedge launched in 2014 and has raised $13.7 million, a modest amount for a cloud-based security service. Oracle says customers and partners can continue to deal with Zenedge using their existing contacts.
Featured Image: Justin Sullivan/Getty Images Readmore
Stealth Security reels in $8 million investment from Shasta Ventures to root out bad bots
We live in world where bots are operating all over the internet. Like Glenda in the Wizard of Oz asking Dorothy if she is a good witch or a bad witch, network admins simply want to determine if a bot is there to help or harm. It’s not always easy to know. That’s where Stealth Security comes in.
The 4-year old startup wants to help you defend against automated bot attacks. Today, the company announced an $8 million Series A investment, funded by Shasta Ventures. Today’s round brings the total raised to $12.5 million, according to Crunchbase.
The company’s founding team came from PayPal, Cisco and Symantec, where they saw a problem for companies eradicating bots with off-the-shelf products. They decided to start a company to solve it. “We have an extensive background in network security, and we applied this and machine learning to solve this problem of handling bots,” company co-founder and CEO Ameya Talwalkar told TechCrunch.
They are trying to stop a number of different kinds of attacks with their product such as credential stuffing where a hacker sends out bots with stolen credentials to a website and tries to find a way in by entering stolen usernames and passwords in quick succession until one works. But Talwalkar says customers are also seeing bots performing legitimate transactions and Stealth’s solution can distinguish the good bots from the bad ones.
CTO and co-founder Shreyans Mehta says they look at intent and the way the customer has configured the product, then count on machine learning to help determine which bots can come in and which ones to block. Companies could choose to block all bots or all except a certain type or any combination they wish.
The company currently has a half a dozen large enterprise customers. Talwalkar says they are targeting the high end of the market with this product and early customers include some of the largest financial services companies in the world. They currently have 15 employees, but are aiming to beef up sales and marketing along with some sales engineers and customer champion type of roles and begin to build on that in the next year, he said.
Featured Image: Mmdi/Getty Images Readmore
Mixpanel analytics accidentally slurped up passwords
The passwords of some people using sites monitored by popular analytics provider Mixpanel were mistakenly pulled into its software. Until TechCrunch’s inquiry, Mixpanel had made no public announcement about the embarassing error beyond quietly emailing clients about the problem. Yet some need to update to a fixed Mixpanel SDK to prevent an ongoing privacy breach.
It’s unclear which clients were impacted due to confidentiality agreements, but Mixpanel lists Samsung, BMW, Intuit, US Bank, and Fitbit as some of the companies it works with. “We can tell you that less than 25% of our customers were impacted” the company’s spokesperson told me, but they noted approximately 4% of all Mixpanel projected suffered from the privacy gap.
Mixpanel has raised $77 million in rounds led by prestigious investors like Andreessen Horowitz and Sequoia. But in early 2016 it laid off 10% of its 230-plus team, and has been dogged by a reputation for being expensive. Today’s news won’t help.
The problem persisted for nine months until a customer alerted Mixpanel on January 5th. By the 9th, the company had begun filtering out and securing passwords it accidentally scooped up, and it’s since destroyed any passwords it received. On February 1st, Mixpanel sent the email found at the end of this article to its clients informing them of the issue.
Clients that auto-update their Mixpanel SDK or load it straight from the startup have already gotten a patch to fix the issue. But some clients that manually update their Mixpanel SDK still need to download a new version to stop the flow of passwords. “Roughly 85% of affected customers have already updated their SDK to address this issue. We are actively working to contact remaining customers who have not yet updated their SDK” according to the spokesperson.
In the meantime, “We’ve disabled Autotrack by default for all new projects created. We’ll be further evaluating Autotrack as a product in the future” the spokesperson says, showing a mature level of contrition.
“To date, our forensics and security experts have not seen any indication that this data was downloaded or accessed by any Mixpanel employee or third party” the company wrote in the email. That’s a relief, since there’s no way for an individual user of one of Mixpanel’s clients to know if their password got sucked in. Still, the possibility that end users’ privacy could have been breached is surely alarming to Mixpanel customers who trust it to watch how their sites and apps are used to optimize performance and monetization. The error could be a windfall for competitors like Google Analytics, KISSmetrics, Splunk, Flurry, and Localytics.
Increasing reliance on open source frameworks like React means engineering and security teams can’t just worry about their company’s own code. It has to mingle with changes to open source projects that can cause unforeseen trouble. It’s like if the ingredients in one of your prescriptions drugs subtly changed, so your preferred over-the-counter pills suddenly caused a dangerous interaction.
The full email from Mixpanel is below:
EMAIL SENT TO CUSTOMERS ON FEBRUARY 1, 2018:
We are writing you today about a recently discovered data ingestion issue on the Mixpanel platform that affects your project(s) and requires that you update your SDK as soon as possible (unless your SDK is set to automatically update). Before we go into detail on what happened and how we’ve addressed the issue, we want to apologize for any difficulty this may cause your organization. Our team is committed to remedying this situation quickly, and we’re available to talk through any questions or concerns—just reply to this email, and we’ll be in touch.
On January 5th, 2018, a customer informed us that they observed Autotrack sending the values of password fields in events. We confirmed that this was unexpected behavior; by design, Autotrack should not send the values of hidden and password form fields.
To date, our forensics and security experts have not seen any indication that this data was downloaded or accessed by any Mixpanel employee or third party. It was a bug, plain and simple. Upon discovery, we took immediate steps to secure the data and shut down further receipt. As of today, all data that was inadvertently received has been destroyed. In order to be as transparent as possible, here is more detail on how we have addressed and will continue to address this issue.
How we’re addressing this issue
Since discovery, we have been actively working to resolve the issue for affected customers. The majority of projects were not impacted, but based on our findings, we believe that you may have project(s) that were impacted, which we list at the end of this email.
We took immediate steps when we discovered this data ingestion issue in the form of the following:
Limit further receipt of data: On January 9th, we implemented a server-side filter to securely discard this data as soon as we receive it, and soon thereafter refined the filter to solve for the last remaining edge cases.
Delete the inadvertently received data: We have cleared all data from our database that we inadvertently received and, upon request, we can provide you with fine-grained metadata about what data was inadvertently sent to Mixpanel servers. This will include a mapping of distinct IDs to property names (but not the data values themselves, which have been securely deleted using appropriate security measures).
Fix the Autotrack bug: We have implemented the Autotrack functionality fix in the Mixpanel SDK. You will, however, need to update your SDK as soon as possible to reflect this change. If your SDK is set to automatically update, or if your website loads the SDK directly from our content servers, then no action is required.
Review any access of this data: We do not believe this data was downloaded or accessed by any Mixpanel employee or third party. To the extent we discover otherwise, we will immediately notify you.
In addition to fixing the root cause of this issue, we’re taking proactive steps to identify and prevent similar issues from occurring in the future:
Incorporating formal privacy reviews as part of our design and development processes: Security and privacy have always been front of mind at Mixpanel, but we’re adding some additional explicit checkpoints in our product development processes to help ensure that we’ve considered all of the impacts of the changes we make.
In-depth security/privacy audits of key existing product areas: We’ve learned a lot from this issue, and our team has been diving in to look for similar cases where these same kinds of problems could arise.
Operationalizing our response tooling: We’ve built new tools in response to this issue to help us identify the scope of data collection, limit access to data, and to purge it from our systems quickly. We’re taking these tools and making them more general purpose so that we can respond more quickly in the unlikely event that a similar problem occurs in the future.
Data filtering and detection: We’re exploring capabilities that can detect something like this sooner including changes to the SDK to give us more insight into what data is being sent to us, integration with Data Loss Prevention (DLP) solutions, and even using our machine learning capabilities to detect anomalous ingestion.
We are conducting a thorough investigation of what happened and how we handled it. We believe that we have addressed the ingestion issue with the speed and accuracy required as your trusted partner. Below the signature, we have also listed your Project ID(s) and Project Name(s) that were affected.
If you have questions or for more information, please reply to this email for a response from your account team. Otherwise, as mentioned before, please update your SDK as soon as possible.
The Mixpanel Security team
Featured Image: Bryce Durbin/TechCrunch Readmore
Serials2 days ago
Shaneeshwaruni Divya Charitra Episode 164
Business2 days ago
MongoDB gets support for multi-document ACID transactions
Entertainment21 hours ago
Films like Black Panther show how the Marvel Cinematic Universe does not shy away from bold creativity
Entertainment3 days ago
NTR 28: Composer Anirudh Ravichander out of the film; SS Thaman most likely to replace as music director
Entertainment3 days ago
Nirav Modi named in Rs 11000 cr Punjab National Bank scam: A look at the designer’s tryst with Bollywood celebrities
Entertainment23 hours ago
Dunkirk: Christopher Nolan reveals why he chose to focus on ‘communal heroism’ in current political climate
Entertainment1 day ago
Padmaavat box-office collection: Sanjay Leela Bhansali’s period-drama grosses Rs 265 cr in its third week
Entertainment2 days ago
Manasuku Nachindi: Mahesh Babu’s sister Manjula on her directorial debut and working with her brother