Nir Goldshlager just saved your identity. One of the world’s top white hat security researchers, Goldshlager this week helped Skype and Dropbox fix a critical security flaw that could have let hackers take control of their users’ Facebook accounts. Tomorrow Goldshlager will detail how he found the exploit, but he gave TechCrunch the early heads up. Here’s how hackers exploit the hole.
In a highly suggestive invitation to an April 4 event sent out on Thursday, Facebook welcomes media to "Come See Our New Home On Android," hinting the social networking monolith will finally reveal a much-rumored purpose-built operating system.
Citing sources familiar with the matter, TechCrunch says the Facebook OS will be a platform built on Android, with deep integration possibly baked into an HTC-manufactured smartphone. Speculation of a true Facebook-developed phone have been floating around for some time, though such a device has yet to appear.
Facebook Inc (NASDAQ:FB) has rewarded a security expert who has located a second flaw in the network. Security experts like Nir Goldshlager have been especially concerned about hackers targeting Facebook in recent months. Goldshlager, who found one bug on the social media network about three weeks ago, discovered a second flaw this week which allowed him to hack the social network a second time.
Facebook users' Likes on the social network may be unintentionally revealing more about their private personality traits, including sexual orientation and intelligence, according to a new study.
By studying the Likes of 58,000 Facebook users on the social network, researchers at the University of Cambridge say they were able to determine users' IQ, gender, sexual orientation, and political and religious beliefs, and even substance use, with an accuracy rate of more than 80 percent
More details have been revealed about the massive cyberattack that hit several tech companies last month. Not only were Apple, Facebook, Microsoft, and Twitter hit -- but other industries' computer systems were also hacked, including prominent car manufacturers, U.S. government agencies, and a candy company.
According to The Security Ledger, people familiar with the matter said that hackers infiltrated computer networks by using at least three third-party "watering hole" Web sites, which made it possible for hackers to put malware on those companies' computers.