Vue normale

Instagram Fixes Password Reset Email Bug After Reports Of Mass Account Abuse

11 janvier 2026 à 20:02
Instagram has addressed an issue that caused many users to receive repeated password reset emails, a situation that sparked widespread concern and speculation about a large-scale data breach. Users have been reporting an unusual increase in account recovery messages in recent weeks, which has led to suspicions that Instagram’s systems have been compromised. Cybercriminals are said to have obtained a database that contained data from roughly 17.5 million Instagram accounts, […]

Google révolutionne l’essayage virtuel en s’appuyant sur de simples selfies

12 décembre 2025 à 13:00

Le géant technologique enrichit son outil d’essayage virtuel avec une fonctionnalité permettant aux utilisateurs d’essayer numériquement des vêtements à partir d’un simple autoportrait. Annoncée jeudi, cette évolution marque une rupture notable avec la version précédente qui exigeait une photographie en pied complète. Désormais, un selfie suffit pour que Nano Banana, le modèle Gemini 2.5 Flash ... Lire plus

L'article Google révolutionne l’essayage virtuel en s’appuyant sur de simples selfies est apparu en premier sur Fredzone.

Covert Web-to-App Tracking via Localhost on Android

2 juillet 2025 à 20:22

We disclose a novel tracking method by Meta and Yandex potentially affecting billions of Android users. We found that native Android apps—including Facebook, Instagram, and several Yandex apps including Maps and Browser—silently listen on fixed local ports for tracking purposes.
These native Android apps receive browsers' metadata, cookies and commands from the Meta Pixel and Yandex Metrica scripts embedded on thousands of web sites. These JavaScripts load on users' mobile browsers and silently connect with native apps running on the same device through localhost sockets. As native apps access programatically device identifiers like the Android Advertising ID (AAID) or handle user identities as in the case of Meta apps, this method effectively allows these organizations to link mobile browsing sessions and web cookies to user identities, hence de-anonymizing users' visiting sites embedding their scripts.
This web-to-app ID sharing method bypasses typical privacy protections such as clearing cookies, Incognito Mode and Android's permission controls. Worse, it opens the door for potentially malicious apps eavesdropping on users’ web activity.


Permalien
❌