Guy Who Beat Facebook's Wall Hack Challenge Gets $10K
Aug 22, 2013 19:52
If you're going to challenge the internet to break your so-called foolproof system, you better put your money where your mouth is.
Khalil Shreateh is a Palestinian hacker who managed to identify a
Facebook bug that let him post on Mark Zuckerberg's wall (see above). He was
supposed to receive $500 for his efforts, but was denied of the reward as Facebook claimed he had violated its terms by "exploiting bugs to
impact real users."
After the hacker community found out, they decided he indeed deserved to be compensated for beating the system. Security researcher Marc Maiffret set up a fundraising campaign on GoFundMe, and managed to successfully collect $10,000 in donations for Shreateh (which is a full 20 times more of what Facebook had initially offered, those cheapskates).
So why was Maiffret involved? Apparently he sympathized with this noble young upstart. Back when he was just a teen, Maiffret home was raided by the FBI over illegal hacking, although at that time he had no idea what the exact offense was. He explained to Bloomberg Businessweek:
I had honestly hacked everything from government systems to [Microsoft] to you name it, a good three years of hacking. These days there’s a much bigger allure, and if you’re getting into hacking and research, there are essentially two paths ahead of you.
The HONOR Magic 7 Pro price in ksa makes it an appealing option for those looking for a high-end smartphone. This advanced device stands out with its sleek design and robust build quality. This blog delves into the details, examining what makes the HONOR Magic 7 Pro unique, from the materials used to its overall durability and user experience. If you’re considering purchasing a high-end smartphone that balances aesthetics and functionality, this review of the HONOR Magic 7 Pro’s design and build quality will provide you with all the information you need. Read more
Organizations continue to reside under substantial pressure to provide security and compliance with data in the current-day complex regulatory ambiance. Enter endpoint management — a strategic approach to managing and securing devices, that has become a key tool for achieving these objectives. Endpoint management solutions assist organizations with stringent compliance requirements by establishing a single interface for monitoring, controlling, and securing devices. Read more
Application security is the face of organizational success in today's digital transformation era. It has been brought about by rising cyberattacks against applications that are forcing businesses to choose strong security solutions. With application security software, one is capable of protecting sensitive data, regulating compliance, and maintaining trust with customers. In this blog, we will review how to evaluate and pick the best application security testing tools, with a spotlight on the capabilities of HCL AppScan. Read more