Meta employee accused of accessing private images

2 hours ago 1

NEWYou tin present perceive to Fox News articles!

When you upload a photograph to Facebook, you expect it to enactment backstage unless you determine otherwise. That anticipation conscionable took a deed aft a erstwhile worker of Meta was accused of accessing thousands of backstage images.

According to details confirmed by the company, the London-based worker allegedly created a programme to bypass interior safeguards. Investigators accidental this whitethorn person allowed entree to astir 30,000 backstage Facebook images that were not meant to beryllium viewed.

The idiosyncratic is present nether transgression probe and is retired connected bail arsenic authorities proceed to reappraisal the case. Here's however investigators accidental the entree whitethorn person happened.

Sign up for my FREE CyberGuy Report

  • Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox.
  • For simple, real-world ways to spot scams aboriginal and enactment protected, visit CyberGuy.com trusted by millions who ticker CyberGuy connected TV daily.
  • Plus, you'll get instant entree to my Ultimate Scam Survival Guide escaped erstwhile you join.

META SMART GLASSES PRIVACY CONCERNS GROW
 

A idiosyncratic   holds a telephone  with the Facebook logo connected  its screen.

A erstwhile Meta worker is accused of accessing thousands of backstage Facebook images, raising caller concerns astir however idiosyncratic information is protected. (Fabian Sommer/picture confederation via Getty Images)

How the Meta worker allegedly accessed backstage images

Authorities judge the worker whitethorn person written a publication to get astir Meta's interior detection systems. In elemental terms, the strategy that should emblem antithetic behaviour whitethorn not person caught the enactment close away. This item matters due to the fact that ample tech platforms trust connected monitoring tools to observe suspicious entree patterns. When those checks are bypassed, it raises questions astir however interior entree is controlled. 

The probe is being handled by the cybercrime portion of the Metropolitan Police successful London. At the aforesaid time, information experts often constituent retired that insider threats are hard to eliminate. Even beardown systems tin beryllium tested erstwhile idiosyncratic wrong the institution misuses their access.

What Meta says astir the worker investigation

Meta says it discovered the improper entree much than a twelvemonth agone and took enactment aft identifying the issue. 

"Protecting idiosyncratic information is our apical priority," a Met spokesperson told CyberGuy. "After discovering improper entree by an worker implicit a twelvemonth ago, we instantly terminated the individual, notified users, referred the substance to instrumentality enforcement, and enhanced our information measures. We are cooperating with the ongoing investigation."

Legal risks successful the Meta backstage images case

Data extortion experts accidental cases similar this often travel down to some intent and safeguards. If an worker accesses idiosyncratic information without authorization, that tin pb to transgression charges nether information extortion and machine misuse laws. However, the company's work depends connected the protections it had successful place. If due safeguards existed, the absorption usually remains connected the individual. 

If not, regulators whitethorn see penalties oregon ineligible claims against the company. The Information Commissioner's Office, the U.K.'s information privateness watchdog, has acknowledged the incident. The bureau stressed that societal media users should beryllium capable to spot however their idiosyncratic accusation is handled. 

Why the Meta probe is drafting attraction now

This lawsuit is unfolding astatine a clip erstwhile scrutiny of large tech platforms is already high. Recent legal challenges have raised broader concerns astir however companies support users and negociate risk. That discourse adds value to this investigation. It reflects a larger speech astir privateness and accountability successful the tech industry. As much radical trust connected integer platforms, expectations astir information extortion proceed to rise. Incidents similar this thin to reenforce those concerns.

META REPORTEDLY BUILDING AN AI VERSION OF MARK ZUCKERBERG TO INTERACT WITH COMPANY EMPLOYEES
 

Mark Zuckerberg walks done  the U.S. Capitol.

Mark Zuckerberg walks done the U.S. Capitol aft a gathering connected March 26, 2026. Investigators successful London accidental a erstwhile Meta worker whitethorn person utilized a publication to bypass safeguards and presumption astir 30,000 backstage Facebook images. (Tom Williams/CQ-Roll Call, Inc via Getty Images)

Simple ways to support your backstage photos

Even though this lawsuit involves an insider, determination are inactive elemental steps you tin instrumentality to amended support your photos and bounds who tin spot them.

1) Check your Facebook privateness settings

You cannot power what happens wrong a company, but you tin bounds however overmuch of your idiosyncratic contented is exposed. Start by reviewing your Facebook privateness settings.

(Settings whitethorn alteration depending connected instrumentality and app version)

Mobile (iPhone/Android):
Facebook: MenuSettings & privacy > Settings > Audience and visibilityPostsWho tin spot your aboriginal posts > select Friends (or a customized audience) > Save

Desktop (Mac/PC):
Facebook: Profile picture (top right) > Settings & privacySettingsAudience and visibility section > PostsWho tin spot your aboriginal posts > select Friends (or a customized audience) > Done

2) Review older photos and albums

Next, spell done older photos and albums. Many radical hide that photos shared years agone whitethorn inactive beryllium disposable nether outdated settings.

(Settings whitethorn alteration depending connected instrumentality and app version)

Mobile (iPhone/Android):
Facebook: MenuSettings & privacySettingsAudience and visibilityPostsLimit who tin spot past postsLimit who tin spot past postsLimit past posts > confirm

Desktop (Mac/PC):
Facebook: Profile pictureSettings & privacySettingsAudience and visibility  conception > Posts > Limit who tin spot past posts > Limit past posts > confirm

And cheque idiosyncratic albums:

Mobile (iPhone/Android):
Facebook: Go to your profilePhotosAlbums > select an album > tap Edit (top right) > Who tin spot this? > choose who tin spot it > Done

Desktop (Mac/PC):
Facebook: click your sanction connected the near > Photos > Albums > prime an medium > click the 3 dots > Edit medium > take who tin spot it > Done

Not each albums tin beryllium changed, and immoderate strategy albums person constricted privateness options. 

3) Be cautious what you upload

It besides helps to bounds what you upload successful the archetypal place. Sensitive images, documents oregon thing you would not privation wide seen whitethorn beryllium amended kept disconnected societal platforms entirely.

META AI EDITS YOUR CAMERA ROLL FOR BETTER FACEBOOK POSTS
 

A idiosyncratic   accesses Facebook connected  a laptop.

Authorities are investigating whether a erstwhile Meta worker improperly accessed backstage Facebook photos that users ne'er intended to share. (Gabby Jones/Bloomberg via Getty Images)

4) Turn connected relationship enactment alerts and two-factor authentication

You tin besides alteration alerts for antithetic relationship activity. While this lawsuit involves an insider, relationship alerts inactive assistance you spot unauthorized entree to your ain profile. You tin besides crook connected two-factor authentication (2FA) to adhd different furniture of extortion to your account.

How to crook connected relationship enactment alerts

(Settings whitethorn alteration depending connected instrumentality and app version)

Mobile (iPhone/Android):
FacebookMenuSettings & privacySettingsAccounts CenterPassword and securitySecurity Checkupreview and implicit recommended information steps

Desktop (Mac/PC):
Facebook: Profile picture (top right) > Settings & privacySettingsAccounts CenterPassword and security > Security Checkupreview and implicit recommended information steps

How to crook connected two-factor authentication

(Settings whitethorn alteration depending connected instrumentality and app version)

Mobile (iPhone/Android):
Facebook: MenuSettings & privacySettingsPassword and securityTwo-factor authentication > choose substance connection oregon authentication appfollow prompts

Desktop (Mac/PC):
Facebook: Profile pictureSettings & privacy > Settings > Password and securityTwo-factor authentication > choose text connection oregon authentication appfollow prompts

5) Check third-party app access

Take a fewer minutes to reappraisal which apps person entree to your Facebook account. Third-party apps tin sometimes clasp much entree than you expect.

(Settings whitethorn alteration depending connected instrumentality and app version)

Mobile (iPhone/Android):
Facebook: MenuSettings & privacy > SettingsApps and websitesActive > pat an app > Remove

Desktop (Mac/PC):
Facebook: Profile picture (top right) > Settings & privacySettingsApps and websitesActive > click an appRemove

If you don't spot immoderate apps listed oregon options similar "Active," it apt means you don't person immoderate connected apps to review.

What this means to you

If you usage Facebook oregon akin platforms, this concern highlights thing galore radical overlook. Even with beardown safeguards, insider entree inactive exists. Employees often request definite permissions to support systems running. That creates a level of spot betwixt users and the company. 

When that spot is broken, it tin consciousness personal. At the aforesaid time, determination are inactive steps you tin instrumentality connected your end. Reviewing your privateness settings, limiting what you stock and enabling information features tin trim however overmuch of your contented is exposed. It besides shows wherefore detection and effect matter. 

In this case, Meta says it identified the issue, removed the worker and notified users. Those steps tin bounds damage, but they bash not erase the concern. The bigger takeaway is that privateness depends connected some exertion and quality behavior. Systems tin trim risk, but they cannot region it completely.

Take my quiz: How harmless is your online security?

Think your devices and information are genuinely protected? Take this speedy quiz to spot wherever your integer habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing close and what needs improvement. Take my Quiz here: Cyberguy.com    

Kurt's cardinal takeaways

This lawsuit is inactive nether investigation, and nary last ineligible result has been announced. Even so, it highlights a hazard galore radical seldom deliberation about. Most privateness conversations absorption connected hackers. This concern is different. It shows however entree from wrong a institution tin make its ain acceptable of risks. Meta says it acted rapidly by removing the employee, notifying users and strengthening its systems. Those steps matter, but they besides amusement however overmuch spot users spot successful the platforms they usage each day. The world is simple. Once you upload thing online, you are trusting much than conscionable the exertion down it.

If idiosyncratic wrong a institution tin entree backstage data, however overmuch power bash you truly person implicit what you stock online? Let america cognize by penning to america at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report

  • Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox.
  • For simple, real-world ways to spot scams aboriginal and enactment protected, visit CyberGuy.com trusted by millions who ticker CyberGuy connected TV daily.
  • Plus, you'll get instant entree to my Ultimate Scam Survival Guide escaped erstwhile you join.

Copyright 2026 CyberGuy.com. All rights reserved. 

Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.

Read Entire Article