{"id":1065,"date":"2016-10-22T16:59:50","date_gmt":"2016-10-22T05:59:50","guid":{"rendered":"https:\/\/www.gedda.info\/?p=1065"},"modified":"2016-10-22T17:00:08","modified_gmt":"2016-10-22T06:00:08","slug":"facebook-app-phishing","status":"publish","type":"post","link":"https:\/\/www.gedda.info\/?p=1065","title":{"rendered":"Facebook phishing app"},"content":{"rendered":"<p>A few &#8220;apps&#8221; in Facebook&#8217;s ecosystem appear to have fallen under the radar of its security checks. I was invited to verify my account by a app under Facebook&#8217;s app.facebook.com domain but the email was sent with an Exchange server, not ZuckMail \ud83d\ude42<\/p>\n<figure id=\"attachment_1066\" aria-describedby=\"caption-attachment-1066\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1066\" src=\"https:\/\/www.gedda.info\/wp-content\/uploads\/2016\/10\/facebook_phishing_app.jpg\" alt=\"Facebook phishing app\" width=\"600\" height=\"294\" srcset=\"https:\/\/www.gedda.info\/wp-content\/uploads\/2016\/10\/facebook_phishing_app.jpg 600w, https:\/\/www.gedda.info\/wp-content\/uploads\/2016\/10\/facebook_phishing_app-300x147.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption id=\"caption-attachment-1066\" class=\"wp-caption-text\">Facebook phishing app<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p>What (if any) process does Facebook have to shut these down?<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A few &#8220;apps&#8221; in Facebook&#8217;s ecosystem appear to have fallen under the radar of its security checks. I was invited to verify my account&#8230;<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33,35],"tags":[187,189,188],"class_list":["post-1065","post","type-post","status-publish","format-standard","hentry","category-the-internet","category-tips-tricks","tag-facebook","tag-phishing","tag-security"],"_links":{"self":[{"href":"https:\/\/www.gedda.info\/index.php?rest_route=\/wp\/v2\/posts\/1065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gedda.info\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gedda.info\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gedda.info\/index.php?rest_route=\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gedda.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1065"}],"version-history":[{"count":2,"href":"https:\/\/www.gedda.info\/index.php?rest_route=\/wp\/v2\/posts\/1065\/revisions"}],"predecessor-version":[{"id":1068,"href":"https:\/\/www.gedda.info\/index.php?rest_route=\/wp\/v2\/posts\/1065\/revisions\/1068"}],"wp:attachment":[{"href":"https:\/\/www.gedda.info\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1065"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gedda.info\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1065"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gedda.info\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}