Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operational Security //

Big Data

// // //
3/27/2018
08:05 AM
Dawn Kawamoto
Dawn Kawamoto
Dawn Kawamoto

Facebook Privacy Policy Is Under Investigation by FTC

Federal Trade Commission reveals it is conducting an open investigation into Facebook's privacy practices, as news reports surface about the social media giant collecting phone call and text message data on its users.

Facebook is facing an open investigation into its privacy practices by the US Federal Trade Commission (FTC), according to an announcement Monday by the agency.

The announcement by the FTC comes after news broke over the weekend that Facebook has been harvesting its users' phone call and text messaging data over the years. This controversy is the latest privacy debacle for Facebook, following its Cambridge Analytica woes. (See In Facebook Debacle, More Than Zuckerberg to Blame.)

In a statement, Tom Pahl, the FTC's acting director of consumer protection, said: "The FTC takes very seriously recent press reports raising substantial concerns about the privacy practices of Facebook. Today, the FTC is confirming that it has an open non-public investigation into these practices."

(Source: Pexels)
(Source: Pexels)

Android users who granted Facebook permission to access its contacts lists during the installation of the social media giant's app in Android 4.1 or earlier versions were also giving Facebook permission to access their call and message logs, Ars Technica reports. And although the Android API permission process changed in version 16, Facebook's API could still continue to gather the phone call and SMS metadata by tapping into an earlier version of the Android software developers kit (SDK), according to the report.

However, in October 2017, Google replaced version 4.0 in its Android API, which at that point apparently halted its access to the data, Ars Technica reports. The report notes that Apple never allowed "silient access" to users' call records.

Facebook, in response to the controversy, denied logging users' phone calls and text messages without their permission, it stated in a blog post. The social media giant says users have to opt in for this feature and that it is designed to allow them to find and stay connected to people for a better experience on Facebook. The social media titan provided a link for users to opt out of Facebook syncing their contacts with Messenger.

This privacy controversy is the latest to hit the social media giant this month, which is facing complaints and lawsuits over allowing a third party, Cambridge Analytica, to harvest information on 50 million users which was used in various election campaigns, such as President Trump's and the UK's Brexit campaign, with success. Late Friday night, a team from the UK's Information Commissioner's Office (ICO) raided Cambridge Analytica's headquarters in London with a search warrant to examine its records, reports The Guardian.


The fundamentals of network security are being redefined -- don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth annual Big Communications Event. There's still time to register and communications service providers get in free!

Pahl stated the FTC is committed to protecting the privacy of consumers and is within its power to use enforcement actions on those companies that fail to honor their privacy promises, comply with the Privacy Shield or cause substantial injury to consumers through violation of the FTC act.

Apple CEO Tim Cook also weighed in on the Facebook privacy controversy over the weekend, while attending the China Development Forum in Beijing, reports Bloomberg. Cook, according to Bloomberg, advocated for "well-crafted" regulations that prevent organizations and individuals from culling users' information and assembling the data and applying it in new ways without their knowledge.

Come May 25, companies across the globe that collect, store or distribute personally identifiable information on European citizens will face steep financial penalties if they do not adhere to the General Data Protection Regulation (GDPR) Act. This upcoming enforcement deadline is anticipated to prompt a number of companies to rethink the ways that they handle data, say privacy experts.

In addition to the FTC investigation, US Sen. Charles Grassley, the chairman of the Senate Judiciary Committee, has invited Facebook CEO Mark Zuckerberg, along with executives from Twitter and Google, to testify before an April 10 hearing about privacy.

Related posts:

— Dawn Kawamoto is an award-winning technology and business journalist, whose work has appeared in CNET's News.com, Dark Reading, TheStreet.com, AOL's DailyFinance, and The Motley Fool.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1142
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
CVE-2023-1143
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
CVE-2023-1144
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
CVE-2023-1145
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
CVE-2023-1655
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.