Application Security

1/25/2018
11:01 AM
50%
50%

Facebook Buys Identity Verification Firm

Facebook has purchased startup Confirm, which uses pattern analysis to confirm identities.

Confirm, a Boston-based identity verification startup, has agreed to be acquired by Facebook. The two companies have not disclosed the terms of their deal.

For three years Confirm has specialized in building technology that confirms user identities using photos of their driver's licenses or other forms of ID. The company has developed APIs and SDKs that can be integrated into applications for verification purposes.

Following the acquisition, Confirm has updated its website to state its current digital identity authentication software offerings will be wound down. It will join Facebook's office in Cambridge, Mass., but has not confirmed how many employees will stay with the company.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
1/27/2018 | 11:20:50 PM
Re: More intrusion?
@jenshadus: In many cases, they already know most of that!
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
1/26/2018 | 4:57:10 PM
Re: More intrusion?
What would Amazon want with FB? Amazon's ways of spying on us are far more reliable and expansive. Moreover, FB's forays into infrastructure and hardware still don't quite hold a candle to those of Amazon's.
jenshadus
50%
50%
jenshadus,
User Rank: Strategist
1/26/2018 | 2:55:18 PM
Re: More intrusion?
You are onto something. 
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
1/26/2018 | 2:48:49 PM
Re: More intrusion?
WE can all worry when Amazon buys Facebook.  THEN the cat will indeed be out of the bag and in a box with that stupid smile on it.
jenshadus
50%
50%
jenshadus,
User Rank: Strategist
1/26/2018 | 1:09:19 PM
More intrusion?
So FB wants to verify who you are, where you are, what you are buying, when you go to sleep?  What the heck?  If this is for on-line shopping, I can see it, for anything else it's a no go for me.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
1/25/2018 | 11:50:58 PM
Boston
Good to know that FB is effectively expanding its footprint here in Boston. I wonder to what extent, if it all, this will impact Amazon's decision in the run-off for HQ2.

(Charitably assuming, of course, that Amazon has not already secretly made its decision and is simply using the 20-city list as a negotiating tactic.)
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.
CVE-2018-18375
PUBLISHED: 2018-10-16
goform/getProfileList in Orange AirBox Y858_FL_01.16_04 allows attackers to extract APN data (name, number, username, and password) via the rand parameter.
CVE-2018-18376
PUBLISHED: 2018-10-16
goform/getWlanClientInfo in Orange AirBox Y858_FL_01.16_04 allows remote attackers to discover information about currently connected devices (hostnames, IP addresses, MAC addresses, and connection time) via the rand parameter.