Post image for Facebook revises security features after hacking of Zuckerberg’s profile

Facebook revises security features after hacking of Zuckerberg’s profile

by Kelly MacNeil on January 27, 2011

A hacker logged onto Facebook founder Mark Zuckerberg's fan page on Tuesday, posting a disparaging status update in Zuckerberg's name and creating a minor embarrassment for the network, which has oft been criticized for its privacy and security settings.

"Let the hacking begin: If Facebook needs money, instead of going to the banks, why doesn't Facebook let its users invest in Facebook in a social way? Why not transform Facebook into a 'social business' the way Nobel Price winner Muhammad Yunus described it? http://bit.ly/fs6rT3 What do you think? #hackercup2011," the status update read.

According to the Toronto Sun, the post was "liked" by 1,800 users over several minutes before Facebook took it down, and it sparked a discussion spanning more than 400 comments.

Facebook has not issued an official response to the event, but it did post a blog entry the following day entitled "A Continued Commitment to Security." The post pointed out that "a key part of controlling information has always been protecting it from security threats like viruses, malware and hackers. That's why we've developed a number of complex systems that operate behind the scenes to keep you secure on Facebook."

TIME reports that Facebook introduced two new security features the next day, including the option for users to view Facebook through a more secure HTTPS connection and a new feature that will prompt users to verify their identities following "suspicious" activity on their accounts. Users who log in from two unlikely locations in the same day will be shown pictures of their friends and asked to identify them, for example.

Zuckerberg's high-profile breach comes after a hacker posted under French President Nicolas Sarkozy's wall last Sunday, claiming that he would not be running for re-election, the Los Angeles Times reports.

Previous post:

Next post: