{"id":14162,"date":"2018-09-28T15:58:19","date_gmt":"2018-09-28T15:58:19","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/29357\/You-Gave-Facebook-Your-Number-For-Security.-They-Used-It-For-Ads..html"},"modified":"2018-09-28T15:58:19","modified_gmt":"2018-09-28T15:58:19","slug":"you-gave-facebook-your-number-for-security-they-used-it-for-ads","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/","title":{"rendered":"You Gave Facebook Your Number For Security. They Used It For Ads."},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.eff.org\/files\/banner_library\/facebook-zuck-2b_0.png\" class=\"ff-og-image-inserted\"\/><\/div>\n<p><span>Add \u201ca phone number I never gave Facebook for targeted advertising\u201d to the list of deceptive and invasive ways Facebook makes money off your personal information. Contrary to user expectations and Facebook representatives\u2019 own previous statements, the company has been using contact information that users explicitly provided for security purposes\u2014or that users<\/span> <em><span>never provided at all<\/span><\/em><span>\u2014for targeted advertising.<\/span><\/p>\n<p><span>A group of academic researchers from<\/span> <a href=\"https:\/\/mislove.org\/publications\/PII-PETS.pdf\"><span>Northeastern University and Princeton University<\/span><\/a><span>, along with<\/span> <a href=\"https:\/\/gizmodo.com\/facebook-is-giving-advertisers-access-to-your-shadow-co-1828476051\"><span>Gizmodo reporters<\/span><\/a><span>, have used real-world tests to demonstrate how Facebook\u2019s latest deceptive practice works. They found that Facebook harvests user phone numbers for targeted advertising in two disturbing ways: two-factor authentication (2FA) phone numbers, and \u201cshadow\u201d contact information.<\/span><\/p>\n<h3><strong>Two-Factor Authentication Is Not The Problem<\/strong><\/h3>\n<p><span>First, when a user gives Facebook their number for security purposes\u2014to<\/span> <a href=\"https:\/\/www.eff.org\/deeplinks\/2016\/12\/12-days-2fa-how-enable-two-factor-authentication-your-online-accounts\"><span>set up 2FA<\/span><\/a><span>, or to receive alerts about new logins to their account\u2014that phone number can become fair game for advertisers within weeks. (This is not the first time Facebook has<\/span> <a href=\"https:\/\/gizmodo.com\/facebook-turned-its-two-factor-security-feature-into-th-1823006334\"><span>misused 2FA phone numbers<\/span><\/a><span>.)<\/span><\/p>\n<p><span>But the important message for users is:<\/span> <strong>this is not a reason to turn off or avoid 2FA.<\/strong> <span>The problem is not with two-factor authentication. It\u2019s not even a problem with the inherent<\/span> <a href=\"https:\/\/krebsonsecurity.com\/2016\/09\/the-limits-of-sms-for-2-factor-authentication\/\"><span>weaknesses of SMS-based 2FA in particular<\/span><\/a><span>. Instead, this is a problem with how Facebook has handled users\u2019 information and violated their reasonable security and privacy expectations.<\/span><\/p>\n<p><span>There are<\/span> <a href=\"https:\/\/www.eff.org\/deeplinks\/2017\/09\/guide-common-types-two-factor-authentication-web\"><span>many types of 2FA<\/span><\/a><span>. SMS-based 2FA requires a phone number, so you can receive a text with a \u201csecond factor\u201d code when you log in. Other types of 2FA\u2014like authenticator apps and hardware tokens\u2014do not require a phone number to work. However, until just<\/span> <a href=\"https:\/\/www.facebook.com\/notes\/facebook-security\/two-factor-authentication-for-facebook-now-easier-to-set-up\/10155341377090766\/\"><span>four months ago<\/span><\/a><span>, Facebook required users to enter a phone number to turn on<\/span> <em><span>any<\/span><\/em> <span>type of 2FA, even though it offers its authenticator as a more secure alternative. Other companies\u2014<\/span><a href=\"https:\/\/www.eff.org\/deeplinks\/2016\/12\/2017-wishlist\"><span>Google notable among them<\/span><\/a><span>\u2014also still follow that outdated practice.<\/span><\/p>\n<p><span>Even with the welcome move to no longer require phone numbers for 2FA, Facebook still has work to do here. This finding has not only validated users who are suspicious of Facebook&#8217;s repeated claims that we have \u201c<\/span><a href=\"https:\/\/www.eff.org\/deeplinks\/2018\/04\/facebook-not-what-complete-user-control-looks\"><span>complete control<\/span><\/a><span>\u201d over our own information, but has also seriously damaged users\u2019 trust in a foundational security practice.<\/span><\/p>\n<p><span>Until Facebook and other companies do better, users who need privacy and security most\u2014especially those for whom using an authenticator app or hardware key is not feasible\u2014will be forced into a corner.<\/span><\/p>\n<h3><strong>Shadow Contact Information<\/strong><\/h3>\n<p><span>Second, Facebook is<\/span> <em><span>also<\/span><\/em> <span>grabbing your contact information from your friends. Kash Hill of<\/span> <em><span>Gizmodo<\/span><\/em> <span>provides<\/span> <a href=\"https:\/\/gizmodo.com\/facebook-is-giving-advertisers-access-to-your-shadow-co-1828476051\"><span>an example<\/span><\/a><span>:<\/span><\/p>\n<blockquote readability=\"14\">\n<p><span>&#8230;if User A, whom we\u2019ll call Anna, shares her contacts with Facebook, including a previously unknown phone number for User B, whom we\u2019ll call Ben, advertisers will be able to target Ben with an ad using that phone number, which I call \u201cshadow contact information,\u201d about a month later.<\/span><\/p>\n<\/blockquote>\n<p><span>This means that, even if you never directly handed a particular phone number over to Facebook, advertisers may nevertheless be able to associate it with your account based on your friends\u2019 phone books.<\/span><\/p>\n<p><span>Even worse, none of this is accessible or transparent to users. You can\u2019t find such \u201cshadow\u201d contact information in the \u201ccontact and basic info\u201d section of your profile; users in Europe can\u2019t even get their hands on it despite<\/span> <a href=\"https:\/\/gdpr-info.eu\/art-15-gdpr\/\"><span>explicit requirements under the GDPR<\/span><\/a> <span>that a company give users a \u201c<\/span><a href=\"https:\/\/www.eff.org\/deeplinks\/2018\/07\/new-rules-protect-data-privacy-where-focus-what-avoid\"><span>right to know<\/span><\/a><span>\u201d what information it has on them.<\/span><\/p>\n<p><span>As Facebook attempts to salvage its reputation among users in the wake of the<\/span> <a href=\"https:\/\/www.eff.org\/deeplinks\/2018\/04\/what-we-want-learn-zuckerbergs-congressional-testimonies-week\"><span>Cambridge Analytica scandal<\/span><\/a><span>, it needs to put its money<\/span> <a href=\"https:\/\/www.facebook.com\/zuck\/posts\/10104712037900071\"><span>where its mouth is<\/span><\/a><span>. Wiping 2FA numbers and \u201cshadow\u201d contact data from non-essential use would be a good start.<\/span><\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/29357\/You-Gave-Facebook-Your-Number-For-Security.-They-Used-It-For-Ads..html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":14163,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[3695],"class_list":["post-14162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacyphonefacebook"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>You Gave Facebook Your Number For Security. They Used It For Ads. 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"You Gave Facebook Your Number For Security. They Used It For Ads. 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-28T15:58:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/you-gave-facebook-your-number-for-security-they-used-it-for-ads.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"You Gave Facebook Your Number For Security. They Used It For Ads.\",\"datePublished\":\"2018-09-28T15:58:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\\\/\"},\"wordCount\":628,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/you-gave-facebook-your-number-for-security-they-used-it-for-ads.png\",\"keywords\":[\"headline,privacy,phone,facebook\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\\\/\",\"name\":\"You Gave Facebook Your Number For Security. They Used It For Ads. 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/you-gave-facebook-your-number-for-security-they-used-it-for-ads.png\",\"datePublished\":\"2018-09-28T15:58:19+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/you-gave-facebook-your-number-for-security-they-used-it-for-ads.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/you-gave-facebook-your-number-for-security-they-used-it-for-ads.png\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,phone,facebook\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacyphonefacebook\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"You Gave Facebook Your Number For Security. They Used It For Ads.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"You Gave Facebook Your Number For Security. They Used It For Ads. 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/","og_locale":"en_US","og_type":"article","og_title":"You Gave Facebook Your Number For Security. They Used It For Ads. 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-09-28T15:58:19+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/you-gave-facebook-your-number-for-security-they-used-it-for-ads.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"You Gave Facebook Your Number For Security. They Used It For Ads.","datePublished":"2018-09-28T15:58:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/"},"wordCount":628,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/you-gave-facebook-your-number-for-security-they-used-it-for-ads.png","keywords":["headline,privacy,phone,facebook"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/","url":"https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/","name":"You Gave Facebook Your Number For Security. They Used It For Ads. 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/you-gave-facebook-your-number-for-security-they-used-it-for-ads.png","datePublished":"2018-09-28T15:58:19+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/you-gave-facebook-your-number-for-security-they-used-it-for-ads.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/you-gave-facebook-your-number-for-security-they-used-it-for-ads.png","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/you-gave-facebook-your-number-for-security-they-used-it-for-ads\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,phone,facebook","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacyphonefacebook\/"},{"@type":"ListItem","position":3,"name":"You Gave Facebook Your Number For Security. They Used It For Ads."}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/14162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=14162"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/14162\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/14163"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=14162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=14162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=14162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}