Feeds

Facebook offers 500 million users SSL crypto

Turn it on yourself...bitch

The Power of One eBook: Top reasons to choose HP BladeSystem

Facebook is giving all users the option of accessing its social networking service via SSL encryption.

The move comes a day after pranksters hacked into the Facebook page of CEO Mark Zuckerberg and less than a month after the company reportedly turned on SSL encryption for anyone viewing the site inside Tunisia, where malicious code was apparently pilfering the login details of users critical of the local government.

"Facebook currently uses HTTPS whenever your password is sent to us, but today we're expanding its usage in order to help keep your data even more secure," the company said Wednesday in a blog post. "Starting today we'll provide you with the ability to experience Facebook entirely over HTTPS. You should consider enabling this option if you frequently use Facebook from public Internet access points found at coffee shops, airports, libraries or schools."

Facebook says that the new tool will be rolled out "slowly" over the next few weeks. Once it's available to you, you can turn on your HTTP connection by visiting the "Account Security" section of Facebook's Account Settings page.

The move was praised by several prominent voices across the web. "Facebook now allows HTTPS/SSL all the time on FB," tweeted über-Googler Matt Cutts. "Huge props to FB! Everyone turn it on! Please."

But that's the rub. Users are required to turn it on themselves. Ideally, Facebook should turn HTTPS on by default. But it can save cash by merely making it an option, knowing that only a small portion of users will actually flip the switch.

Google automatically turns on SSL encryption for all Gmail users, and it offers HTTPS as an option with its search engine and various other services. Microsoft is offering SSL as an option with Hotmail – though it may not work in tandem with complementary tools such as Redmond Outlook Hotmail Connector and Windows Live Mail. Yahoo! and MySpace have yet offer always-on HTTPS, even as an option.

With today's blog post, the company also introduced what it calls "social authentication". If Facebook suspects your account has been compromised, it may show you pictures of your online friends and ask you to identify them.

"Instead of showing you a traditional captcha on Facebook, one of the ways we may help verify your identity is through social authentication. We will show you a few pictures of your friends and ask you to name the person in those photos. Hackers halfway across the world might know your password, but they don't know who your friends are," the company said. ®

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.