Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Facebook Unveils New Privacy, Security Features for Messenger

Facebook on Wednesday unveiled new privacy and security features for its Messenger application.

Facebook on Wednesday unveiled new privacy and security features for its Messenger application.

One of the new privacy features is called App Lock and it allows users to protect their private chats when they borrow their phone to a friend or family member. App Lock prevents unauthorized users from accessing Messenger by requesting some form of authentication, such as fingerprint or face authentication, before giving access to messages.Facebook Messenger App Lock

App Lock is currently available for iPhones and iPads, but the social media giant is also working on adding it to the Android version of Messenger “in the next few months.”

This new feature can be found in the new Privacy settings section that Facebook has added to Messenger. All privacy-related features will be available in this location.

Facebook also announced that it’s working on new controls that will allow users to specify who can call or message them directly, whose requests will go to a “requests folder,” and who will be completely blocked.

“We’re also exploring more ways to protect your privacy and safety when someone you don’t know sends you a message,” explained Jay Sullivan, director of product management in Facebook’s Messenger Privacy and Safety department. “We’ll be testing a feature similar to what exists on Instagram and WhatsApp that blurs images in your message requests folder. This way, you have the choice to view an image from someone you may not know before replying to the message or blocking or reporting the account.”

Similar features are already available in Instagram and WhatsApp.

Related: Facebook Awards Researcher $20,000 for Account Hijacking Vulnerability

Related: Facebook Sues 12 Fraudulent Domain Names

Advertisement. Scroll to continue reading.

Related: Facebook Offering Big Rewards for Vulnerabilities in Hermes, Spark AR

Related: Facebook Takedowns Reveal Sophistication of Russian Trolls

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Email Security

Many Fortune 500, FTSE 100 and ASX 100 companies have failed to properly implement the DMARC standard, exposing their customers and partners to phishing...