Facebook Gets Seven Unauthorized Log-in Attempts per Second

By Ashok Bindra November 01, 2011

BusinessInsider reported this week that social networking giant Facebook gets more than 600,000 unauthorized log-in attempts every day. It amounts to seven per second. And those numbers come from Facebook, wrote BusinessInsider reporter Matt Rosoff.

At that rate, according to Facebook, only 0.06 percent of more than 1 billion log-ins per day are compromised, wrote Rosoff. So security firm Sophos picked up on the statistics from Facebbook and did some analysis to come with another interpretation. As per the security firm’s interpretation, it amounts to 600,000 unlawful log-ins per day.

As per the BusinessInsider report, the new feature just announced by Facebook is called "Trusted Friends." It lets the subscriber pick three to five friends to share a key code with in case the subscriber loses access to the account. While one can always do a password reset to recover the account, but if the subscriber’s password has been snooped, odds are you can't get into your email either.

In a blog post, Facebook said it is “like giving a house key to a friend." Furthermore, Facebook has also announced "App Passwords," a new security measure that lets you assign passwords to specific third-party apps you frequently use, wrote Rosoff.

According to the reporter, “these two new features are being tested over the coming weeks, and should launch soon after the testing concludes.”

For better understanding of the full range of security features and how they all work together to keep the subscribers safe while on Facebook, the social networking giant has released an infographic. It provides a complete overview of all the security tools available to all Facebook users.

 


Ashok Bindra is a veteran writer and editor with more than 25 years of editorial experience covering RF/wireless technologies, semiconductors and power electronics. To read more of his articles, please visit his columnist page.

Edited by Rich Steeves

TechZone360 Contributor

SHARE THIS ARTICLE
Related Articles

LogJam Computer Bug Creates Another Ruckus

By: Peter Bernstein    5/21/2015

When it comes to malware and other types of computer bugs it seems like we are falling into a problematic pattern: it consists of researchers or "ethi…

Read More

Network Shifts to Support Video Distribution

By: Tara Seals    5/21/2015

Network strategies are underpinned by many aspects. It starts with consumer adoption of online and mobile video in droves. It continues with local cac…

Read More

Fed Cloud Computing Caucus Report Outlines Plan to Increase Cloud Services Adoption

By: Laura Stotler    5/20/2015

The U.S. government has been slowly making a migration to the cloud since the Cloud First policy was instated in 2011, but the going has been tough an…

Read More

Lenovo Could be the New Powerhouse on the Block

By: Rob Enderle    5/19/2015

Next week is the launch of Lenovo Technology World in China and the CEOs of Intel, Microsoft, and Baidu (likely the only company that scares the crap …

Read More

Why Seller Security Risk Assessments Can Make Marketers Mad

By: Peter Bernstein    5/19/2015

We live in a world where e-commerce is increasingly becoming the way transactions take place. It is a world where programmatic advertising is foundati…

Read More