By Lauren Hockenson, Giga Om
Facebook on Thursday announced the final phase of removing an old privacy feature from the social media platform. The feature, which allows users to be hidden from search, will finally be taken away for users who have it enabled.
The feature, called "Who can look up your Timeline by name?" was removed from Privacy settings last year (noted in a December blog post) for those who didn't have it enabled. When enabled, the setting removes the ability for users to access a Timeline profile via search, even when a user puts in the exact name of the person he or she is locating. Now, users that still have that feature enabled will begin to see removal notices from Facebook, indicating that they will be present and visible in Graph Search along with the rest of the Facebook user base.
Facebook says in the blog post that the feature is a vestigial precaution that reaches back before the platform had a sophisticated search algorithm. When Facebook search acted as a mere directory, removing oneself from search made it more difficult for strangers to access a given profile. But now, as Open Graph opens up to search more settings and there is greater visibility of Timelines for friends of friends, the importance of finding a person through search has diminished while controlling the content on any given Timeline has become more important. Facebook says that the feature also caused hiccups in the user experience:
"People told us that they found it confusing when they tried looking for someone who they knew personally and couldn't find them in search results, or when two people were in a Facebook Group and then couldn't find each other through search."Of course, the sunsetting of this feature for those who care about it the most only stresses the importance of checking and updating Facebook privacy settings often. Now, it's more important to consider the content of the Timeline itself: a "private Timeline" is only such when content is marked explicitly "Friends Only." As Facebook continues to make search easier, it's important to keep in mind how these changes impact social media privacy at large.
by Associated Press
NEW YORK — A worldwide gang of criminals stole a total of $45 million in a matter of hours by hacking their way into a database of prepaid debit cards and then draining cash machines around the globe, federal prosecutors said Thursday — and outmoded U.S. card technology may be partly to blame.
Seven people are under arrest in the U.S. in connection with the case, which prosecutors said involved thousands of thefts from ATMs using bogus magnetic swipe cards carrying information from Middle Eastern banks. The fraudsters moved with astounding speed to loot financial institutions around the world, working in cells including one in New York, Brooklyn U.S. Attorney Loretta Lynch said.
She called it "a massive 21st-century bank heist" carried out by brazen thieves.
One of the suspects was caught on surveillance cameras, his backpack increasingly loaded down with cash, authorities said. Others took photos of themselves with giant wads of bills as they made their way up and down Manhattan.
Here's how it worked:
Hackers got into bank databases, eliminated withdrawal limits on pre-paid debit cards and created access codes. Others loaded that data onto any plastic card with a magnetic stripe — an old hotel key card or an expired credit card worked fine as long as it carried the account data and correct access codes.
A network of operatives then fanned out to rapidly withdraw money in multiple cities, authorities said. The cells would take a cut of the money, then launder it through expensive purchases or ship it wholesale to the global ringleaders. Lynch didn't say where they were located.
It appears no individuals lost money. The thieves plundered funds held by the banks that back up prepaid credit cards, not individual or business accounts, Lynch said.
She called it a "virtual criminal flash mob," and a security analyst said it was the biggest ATM fraud case she had heard of.
There were two separate attacks, one in December that reaped $5 million worldwide and one in February that snared about $40 million in 10 hours with about 36,000 transactions. The scheme involved attacks on two banks, Rakbank in the United Arab Emirates and the Bank of Muscat in Oman, prosecutors said.
The plundered ATMs were in Japan, Russia, Romania, Egypt, Colombia, Britain, Sri Lanka, Canada and several other countries, and law enforcement agencies from more than a dozen nations were involved in the investigation, U.S. prosecutors said.
The accused ringleader in the U.S. cell, Alberto Yusi Lajud-Pena, was reportedly killed in the Dominican Republic late last month, prosecutors said. More investigations continue and other arrests have been made in other countries, but prosecutors did not have details.
An indictment unsealed Thursday accused Lajud-Pena and the other seven New York suspects of withdrawing $2.8 million in cash from hacked accounts in less than a day.
Such ATM fraud schemes are not uncommon, but the $45 million stolen in this one was at least double the amount involved in previously known cases, said Avivah Litan, an analyst who covers security issues for Gartner Inc.
Middle Eastern banks and payment processors are "a bit behind" on security and screening technologies that are supposed to prevent this kind of fraud, but it happens around the world, she said.
"It's a really easy way to turn digits into cash," Litan said.
Some of the fault lies with the ubiquitous magnetic strips on the back of the cards. The rest of the world has largely abandoned cards with magnetic strips in favor of ones with built-in chips that are nearly impossible to copy. But because U.S. banks and merchants have stuck to cards with magnetic strips, they are still accepted around the world.
Lynch would not say who masterminded the attacks globally, who the hackers are or where they were located, citing an ongoing investigation.
The New York suspects were U.S. citizens originally from the Dominican Republic, lived in the New York City suburb orf Yonkers and were mostly in their 20s. Lynch said they all knew one another and were recruited together, as were cells in other countries. They were charged with conspiracy and money laundering. If convicted, they face 10 years in prison.
Arrests began in March.
Lajud-Pena was found dead with a suitcase full of about $100,000 in cash, and the investigation into his death is continuing separately. Dominican officials said they arrested a man in the killing who said it was a botched robbery, and two other suspects were on the lam.
The first federal study of ATM fraud was 30 years ago, when the use of computers in the financial community was growing rapidly. At the time, the Bureau of Justice Statistics found nationwide ATM bank loss from fraud ranged from $70 and $100 million a year.
By 2008, that had risen to about $1 billion a year, said Ken Pickering, who works in security intelligence at CORE Security, a white-hat hacking firm that offers security to businesses.
He said he expects news of the latest ring to inspire other criminals.
"Once you see a large attack like this, that they made off with $45 million, that's going to wake up the cybercrime community," he said.
"Ripping off cash, you don't get that back," he said. "There are suitcases full of cash floating around now, and that's just gone."
AP Technology Writer Peter Svensson in New York, AP National Writer Martha Mendoza in San Jose, Calif., and Associated Press writer Ezequiel AbiÃº LÃ³pez in Santo Domingo, Dominican Republic, contributed to this report.
—Copyright 2013 Associated Press