Facebook architecture allows 3rd parties to install bunch of applications that will let you play, make some quiz and other. Basically the will suck your profile informations and parse the result in facebook pages. The major problem is that Facebook doesn’t control the apps and some code are really bad. Here is an exemple of […]
Tags:
facebook
Press up, up, down, down, left, right, left, right, b, a, enter key then press up and down then magic circles will appear. Just reload the page to remove it. Facebook dev have much time to loose to make heavy dirty code… What’s scary is that any javascript can be included in the page based […]
Tags:
facebook
When a young Swiss hacker and an Interpol agent met in the Vatican on Friday, they understandably differed on many issues. They did, however, coincide in a recommendation for Catholic individuals and officials: Exercise common sense and caution when connected to the Net. Their meeting occurred in the context of a four-day conference that ended […]
Tags:
hacker,
interpol
Researchers at the University of Pennsylvania say they’ve discovered a way to circumvent the networking technology used by law enforcement to tap phone lines in the U.S. The flaws they’ve found “represent a serious threat to the accuracy and completeness of wiretap records used for both criminal investigation and as evidence in trial,” the researchers […]
Tags:
ddos,
fbi,
wiretap
If you’re one of the about 10% of Twitter users that protect your tweets, watch out, because anybody can read them with a simple Google search.
Tags:
twitter
Dutch hacker accesses jailbroken iPhones, requests €5
Tags:
hacker,
iphone