Apparently, a number of Facebook employees visited a mobile app development website– whether the site was a strategic partner of theirs, or just an attempt by some employees to root their smartphones during their downtime we’ll never know– and ended up on the receiving end of a Java exploit that Oracle wasn’t even aware existed. According to the Social Media giant, no evidence suggests that Facebook member data was compromised. Cooperating with the FBI, Facebook hopes that any information they are able to provide will get them one step closer to the origin of this new malware.
“As soon as we discovered the presence of the malware, we remediated all infected machines, informed law enforcement, and began a significant investigation that continues to this day,” said Facebook in a press release.
Interesting to note– the security breach occured despite Facebook’s systems running up-to-date antivirus software. You know we’re going to have to beat the drum on this one: Having security software is only a small piece of the IT Security puzzle. Who’s to say that Facebook’s employees didn’t know better than to enable Java while browsing through developer forums or site? These are the types of places that serve as a litmus test for those flexing their programming chops, by hook or by crook. Who’s to say that the mobile app developer’s site wasn’t hijacked without their knowledge, putting all of their potential client-base at risk? It’s a dirty game out there. Getting your feet wet by absorbing information pertaining to the way you conduct business digitally will keep you above water and productive when others are unable. Understanding that even the mighty Facebook– the same company that brought you 8 million ways to procrastinate while at work– isn’t perfect might keep you on your toes!