Modern Australian
Times Advertising

Facebook hack reveals the perils of using a single account to log in to other services

  • Written by Mike Johnstone, Security Researcher, Associate Professor in Resilient Systems, Edith Cowan University
Facebook hack reveals the perils of using a single account to log in to other services

Facebook announced on Friday that its engineering team had discovered a security issue affecting almost 50 million accounts. Due to a flaw in Facebook’s code, hackers were able to take over an account and use it in the same way you would if you had logged into the account with a password.

The company says it has now fixed the problem in its code and reset access tokens for those accounts – along with 40 million other accounts that were vulnerable to the flaw. If you found yourself logged out of your Facebook account last week, it’s likely you were affected.

Read more: Overcoming 'cyber-fatigue' requires users to step up for security

Beyond that, little is known about the extent of the security breach. In its security update, Facebook said:

Since we’ve only just started our investigation, we have yet to determine whether these accounts were misused or any information accessed. We also don’t know who’s behind these attacks or where they’re based.

What it means

This is not the worst data breach to date. That accolade belongs to the credit bureau Equifax, which had personal data stolen from the accounts of 147 million people. But, unfortunately for Facebook, there are several flow-on effects from the recent hack.

First, the breach may run afoul of the European Union’s General Data Protection Regulation (GDPR), which was introduced in May. Although the GDPR only applies to European citizens, the penalties for data breaches are severe – up to 4% of global turnover per breach.

Read more: Regulating Facebook won't prevent data breaches

Second, any accounts on other platforms that use Facebook verification are also at risk. That’s because it’s now a common practice to use one account as an automatic verification to connect to other platforms, for example by using a Facebook account to log in to another social media platform such as Twitter, Spotify or Instagram. This is known as single sign-on (SSO).

How single sign-on works

If you connect to any system, you need some form of authentication – usually a login credential such as a username and password pair. When you have many different systems that all require credentials before you can use them, suddenly you’re faced with remembering ten different (ideally very long) passwords.

Some people can do this, but many can’t. And we still want the systems to be secure. If we could connect to one system that was trusted by the others, and use the trusted system’s password, then we wouldn’t need ten passwords – just one. That’s the principle behind SSO.

But this only works as long as the trusted system is secure. If it’s not, a cybercriminal could use the hacked account on one platform (in this case, Facebook), to access any other connected platform.

What you should do

Authentication usually works because of one of three factors:

  • something you know, such as a password
  • something you have, such as an access card
  • something you are, such as a fingerprint.

Clearly, using more than one factor increases security. In your Facebook account, you can choose to use two-factor authentication. That means that you would need to enter your password plus a code sent to you via an SMS message when you next log in.

Read more: The age of hacking brings a return to the physical key

The future of verification

There is always a tension between usability and security. People want systems to be secure so that their identities aren’t stolen, and they also want the same systems to be easily accessible. SSO is an attempt to balance usability and security, but the Facebook hack reveals its limitations.

Many people don’t like passwords, so they choose easily remembered, and therefore easily breakable, passwords. Cybercriminals have access to lists of millions of common passwords (hint: “Gandalf” isn’t as unique as you might think).

Access tokens, such as cards or other physical devices (as used by some banks, for example) are a solution – as long as you don’t lose it. It might be that using a unique physical attribute is the best way forward. After all, you always carry your fingerprint, iris or voice with you.

Authors: Mike Johnstone, Security Researcher, Associate Professor in Resilient Systems, Edith Cowan University

Read more http://theconversation.com/facebook-hack-reveals-the-perils-of-using-a-single-account-to-log-in-to-other-services-104227

What Not to Pack When Moving: The Essential Guide to Smart Packing

Moving house is one of those all-encompassing events in life and most people focus their energy on deciding what to pack. But knowing what not to pa...

From Assistance to Independence: Progression in Daily Living Skills

The ultimate goal of many support systems is to empower individuals to lead lives defined by autonomy and self-reliance. While some support requiremen...

The Cost Difference Between Early Repairs and Delayed Replacement

Automotive maintenance often involves a choice between addressing a small issue immediately or waiting until a component fails completely. When it c...

What Is a Stainless Steel Bar? Applications, Benefits, and Buying Tips

Stainless steel is one of the most widely used materials across industrial and commercial sectors, known for its strength, corrosion resistance, and...

Scholars in Developing Nations Depending on Z library

Access to books often shapes the course of study for scholars who live in regions with thin library shelves and slow supply chains. Many students wo...

6 Cheapest POS Systems in Australia (2026)

The cheapest POS systems in Australia for 2026 are POSApt, Square, Zeller, Loyverse, Epos Now, and Shopify POS (Lite). However, “cheap” does no...

The Ultimate Guide to Automating Your Weekend Yard Chores

We all look forward to the weekend as a chance to unwind after a long week of work. You probably picture yourself relaxing on the patio with a cold ...

How Ignoring Regular Car Servicing Can Lead to Costly Repairs

Owning a car gives you a sweet sense of freedom and comfort. You can go wherever you want, whenever you want. But with that freedom comes responsibili...

Someone Trips at Your Fundraiser. Now What? Understanding Public Liability for NFPs

Three months of planning. Volunteers giving up their weekends. Sponsorships chased, catering sorted, tables decorated. And then, about an hour into ...

Stainless Steel Tube: A Complete Specification Guide for Engineers, Project Managers, and Industrial Buyers

Few materials in the industrial and manufacturing world are as universally relied upon — or as frequently misspecified — as stainless steel tube...

How to Choose the Right Barber Shears Scissors for Professional Results

Since a barber is only as good as their tool, choosing the right barber shear scissor must not be taken lightly. Most barbers end up buying the first ...

Why Commercial Construction Companies Play A Critical Role In Modern Urban Development

Urban development requires highly organised planning, engineering expertise, and professional construction teams capable of delivering complex build...

Essential Features for Comfortable Family Caravan Trips

Choosing the right van for family travel requires careful consideration of how the space will be used on a daily basis. Families have specific needs...

Chatswood Tutor: Helping Students Achieve Academic Success With Personalised Learning

Education plays a crucial role in shaping a student’s future, and many students benefit from additional academic support outside the classroom. A pr...

How External Consulting Can Guide Enterprise IT Strategy and Procurement

Internal IT teams carry deep operational knowledge, but that familiarity can create blind spots in strategic decisions. An external IT consultant br...

Why Sports Nutrition Australia Is Important for Performance and Recovery

Athletes and fitness enthusiasts place significant demands on their bodies during training and competition. Maintaining energy levels, supporting mu...

How Body Contouring Bundoora Helps Improve Shape And Confidence

Modern aesthetic treatments have made it possible to refine body shape without the need for invasive surgery. One of the most popular non-surgical o...

Why Plantation Shutters Are a Stylish and Practical Choice for Modern Homes

Window coverings play a major role in the comfort, privacy, and overall design of a home. Homeowners often look for solutions that provide both visu...