{"id":849,"date":"2009-05-19T10:08:51","date_gmt":"2009-05-19T09:08:51","guid":{"rendered":"http:\/\/blog.intego.com\/?p=849"},"modified":"2009-05-19T10:08:51","modified_gmt":"2009-05-19T09:08:51","slug":"facebook-as-a-source-of-passwords-for-hackers","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/","title":{"rendered":"Facebook as a Source of Passwords for Hackers"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/facebook.jpg\"><\/p>\n<p>An <a href=\"http:\/\/www.macworld.com\/article\/140650\/2009\/05\/facebook_phishing_passwords.html\">article on Macworld<\/a> discusses how phishers are using Facebook as a source of passwords, which, in many cases, can allow them to steal users&#8217; identities on other web sites. This all starts with the usual phishing attack: a hacked Facebook account sends links to friends, and these users see what looks like a real log-in page. When a user enters their name and password, the phishers have valuable information that may be useful for more than just a Facebook account.<\/p>\n<p>Many computer users have a single password for all their online activities, including sites such as Facebook, e-commerce sites, and their banks. In this case, grabbing that password &#8211; and being able to link it to a user via their Facebook info &#8211; is like having a key to all their identity information.<\/p>\n<p>There are two lessons to be learned here. First, always check the URLs of &#8220;login&#8221; pages. Even if they look real &#8211; and, heck, anyone can copy the HTML code and graphics from a web page and make a copy &#8211; the URL should tell you something about whether the page is real. If you have any doubt, type in the URL of the site you want to log into (such as www.facebook.com) then click the Login link on that page.<\/p>\n<p>Second, don&#8217;t use a single password for all your accounts. Make up a number of passwords, and don&#8217;t use your pet&#8217;s name, your kid&#8217;s name, or anything else that people can find on public web sites about you. Here&#8217;s a suggestion: make a password using two words and a number. If you&#8217;re a fan of, say, Lost, why not use something like ben108locke? You could even alternate capital letters: BeN108lOcKe to make it even sneakier. It&#8217;s hard to figure out, does not appear in any dictionary, yet it&#8217;s probably very easy to remember if you&#8217;re a Lost fan. Then, make a new password for your bank site: how about sawyer23kate? And for e-commerce sites? Try island42widmore. Security through obscurity is your friend.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An article on Macworld discusses how phishers are using Facebook as a source of passwords, which, in many cases, can allow them to steal users&#8217; identities on other web sites. This all starts with the usual phishing attack: a hacked Facebook account sends links to friends, and these users see what looks like a real [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"An article on Macworld discusses how phishers are using Facebook as a source of passwords, which, in many cases, can allow them to steal users&#039; identities\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Facebook as a Source of Passwords for Hackers  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"An article on Macworld discusses how phishers are using Facebook as a source of passwords, which, in many cases, can allow them to steal users&#039; identities\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-05-19T09:08:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/facebook.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/facebook.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/facebook.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/\",\"name\":\"Facebook as a Source of Passwords for Hackers - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#primaryimage\"},\"datePublished\":\"2009-05-19T09:08:51+00:00\",\"dateModified\":\"2009-05-19T09:08:51+00:00\",\"description\":\"An article on Macworld discusses how phishers are using Facebook as a source of passwords, which, in many cases, can allow them to steal users' identities\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Facebook as a Source of Passwords for Hackers\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Facebook as a Source of Passwords for Hackers\",\"datePublished\":\"2009-05-19T09:08:51+00:00\",\"dateModified\":\"2009-05-19T09:08:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#webpage\"},\"wordCount\":351,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/facebook.jpg\",\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"An article on Macworld discusses how phishers are using Facebook as a source of passwords, which, in many cases, can allow them to steal users' identities","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/","og_locale":"en_US","og_type":"article","og_title":"Facebook as a Source of Passwords for Hackers  - The Mac Security Blog","og_description":"An article on Macworld discusses how phishers are using Facebook as a source of passwords, which, in many cases, can allow them to steal users' identities","og_url":"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-05-19T09:08:51+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/facebook.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/facebook.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/facebook.jpg"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/","name":"Facebook as a Source of Passwords for Hackers - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#primaryimage"},"datePublished":"2009-05-19T09:08:51+00:00","dateModified":"2009-05-19T09:08:51+00:00","description":"An article on Macworld discusses how phishers are using Facebook as a source of passwords, which, in many cases, can allow them to steal users' identities","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Facebook as a Source of Passwords for Hackers"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Facebook as a Source of Passwords for Hackers","datePublished":"2009-05-19T09:08:51+00:00","dateModified":"2009-05-19T09:08:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#webpage"},"wordCount":351,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/facebook-as-a-source-of-passwords-for-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/facebook.jpg","articleSection":["Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-dH","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/849"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=849"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/849\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}