Application Security

8/29/2018
12:50 PM
50%
50%

Instagram Debuts New Security Tools

Updates include a new feature to verify the authenticity of popular accounts and a means of integrating two-factor authentication.

Instagram today announced three security updates intended to drive trust in the platform and lessen the likelihood of fraudulent, and potentially malicious, accounts influencing users.

First, the social networking app, which confirmed a security incident earlier this month, announced plans to help users evaluate the authenticity of large Instagram accounts. Via an "About This Account" menu item, users will be able to access data including the date the account joined Instagram, where it's located, accounts with shared followers, username changes in the past year, and any ads the account might be running.

Accounts with broad reach will be able to review this information in September before it reaches a global audience, said Instagram co-founder and CTO Mike Krieger, in a blog post.

In another update, Instagram – which typically lets large accounts (public figures, celebrities, global brands) verify their identities with a blue checkmark next to their usernames – has launched a new way to request verification. To do so, an account holder will have to access a verification request form within the app and provide a username, full name, and legal or business identification.

Finally, users will soon have the option to use third-party authenticator apps to access their accounts, according to Krieger. Setup can be done within the app; if you already use an authentication app on your phone, Instagram will automatically find it and send a login code.

Read more details here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
tomandreson
50%
50%
tomandreson,
User Rank: Apprentice
9/19/2018 | 6:32:13 PM
Instagram security
Instagram is one of the best social media platforms where we can interact with our friends and favorite celebrities. The Instagram has recently released some security as I have seen on SEO Services Dubai as well as here. So, these security updates are helpful for the users to use their account safely. 
Valentine's Emails Laced with Gandcrab Ransomware
Kelly Sheridan, Staff Editor, Dark Reading,  2/14/2019
High Stress Levels Impacting CISOs Physically, Mentally
Jai Vijayan, Freelance writer,  2/14/2019
Mozilla, Internet Society and Others Pressure Retailers to Demand Secure IoT Products
Curtis Franklin Jr., Senior Editor at Dark Reading,  2/14/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-20025
PUBLISHED: 2019-02-19
Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0.
CVE-2018-20026
PUBLISHED: 2019-02-19
Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.
CVE-2018-9867
PUBLISHED: 2019-02-19
In SonicWall SonicOS, administrators without full permissions can download imported certificates. Occurs when administrators who are not in the SonicWall Administrators user group attempt to download imported certificates. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier.
CVE-2019-5780
PUBLISHED: 2019-02-19
Insufficient restrictions on what can be done with Apple Events in Google Chrome on macOS prior to 72.0.3626.81 allowed a local attacker to execute JavaScript via Apple Events.
CVE-2019-5781
PUBLISHED: 2019-02-19
Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.