Similar Posts
Facebook bug disables thousands of female user accounts
Thousands of female Facebook users had their accounts inexplicably disabled today. They did not violate Facebook’s terms of use but nevertheless, they are seeing messages claiming their accounts are “inauthentic,” according to Me & Her. Facebook has confirmed the issue and is asking users to scan and upload a copy of a valid driver’s license…
Fake Twitter homepage kit serves up naked ladies and infection files
You might be wondering why the frontpage of Twitter has a big “Edit” line running through it in the screenshot below: The answer, of course, is that this is not the real Twitter page at all. It’s part of an increasingly popular kit used for shenanigans: The scammer downloads the zip, edits the links in…
Report: iOS vulnerability sold for $250,000
The H-Security: Business appears to be booming for those who trade in unpatched (zero-day) security holes: according to a report by Forbes magazine, a US company that works for the US government recently paid $250,000 for a vulnerability in Apple’s iOS operating system. The report says that the deal was arranged by a hacker who…
Microsoft adds RAW photo file support to Windows
Microsoft announced the release of a Camera Codec pack for Windows that offers support for the RAW file format from within Windows Explorer as well as Windows Live Photo Gallery 2011. The Codec Pack has support for more than 120 RAW file formats from brands such as Canon, Nikon, Sony, Olympus, Pentax, Leica, Minolta, Panasonic,…
Twitter: 60 percent growth outside U.S.
Aiming for one billion Twitterers by 2013? Twitter’s International Team Lead Engineer Matt Sanford has blogged on the company’s site that Twitter is seeing growth of over 60 percent in registrations outside the U.S. After setting up a Spanish language capability in November, the microblogging service saw a huge surge in registrations in Latin America,…
From XSS to root: Lessons Learned From a Security Breach
In an excellent blog, the people from Apache did a very good job analyzing and documenting how a security breach happened–going through all the stages of the attack and drawing conclusions. Should you ever become the unfortunate victim of an attack, this blog offers an example of how to document it! I quote:”If you are…