Guy Hacks Mark Zuckerberg's Wall to Inform Him of a Bug
Aug 19, 2013 18:55
A white hat hacker named Khalil from Palestine had submitted bug reports to Facebook about a glitch that allowed him to post on anybody's wall. Facebook ignored his report, so the concerned hacker took matters into his own hands by writing on Mark Zuckerberg's wall to get his attention.
Khalil had submitted a full description of the bug, and follow-up proof of its existence to the Facebook security feedback page - researchers can win rewards amounting to $500 for discovering significant vulnerabilities.
He tried again, but he received an email reply saying that it wasn't a bug. So he posted on Zuckerberg's wall saying, "First sorry for breaking your privacy and post to your wall , i has no other choice to make after all the reports i sent to Facebook team ." He then detailed the situation, complete with links.
A Facebook engineer contacted Khalil minutes later for more information and blocked his account "as a precaution while a security team fixed the bug. His account was re-enabled later, but Facebook said he couldn't claim a reward for the find in hacking Zuck's wall because he violated the social network's terms of service.
They said "exploiting bugs to impact real users is not acceptable behavior for a white hat. In this case, the researcher used the bug he discovered to post on the timelines of multiple users without their consent."
And all Khalil wanted to do was good. Oh well, at least we know our walls our safe?
The HONOR Magic 7 Pro price in ksa makes it an appealing option for those looking for a high-end smartphone. This advanced device stands out with its sleek design and robust build quality. This blog delves into the details, examining what makes the HONOR Magic 7 Pro unique, from the materials used to its overall durability and user experience. If you’re considering purchasing a high-end smartphone that balances aesthetics and functionality, this review of the HONOR Magic 7 Pro’s design and build quality will provide you with all the information you need. Read more
Organizations continue to reside under substantial pressure to provide security and compliance with data in the current-day complex regulatory ambiance. Enter endpoint management — a strategic approach to managing and securing devices, that has become a key tool for achieving these objectives. Endpoint management solutions assist organizations with stringent compliance requirements by establishing a single interface for monitoring, controlling, and securing devices. Read more
Application security is the face of organizational success in today's digital transformation era. It has been brought about by rising cyberattacks against applications that are forcing businesses to choose strong security solutions. With application security software, one is capable of protecting sensitive data, regulating compliance, and maintaining trust with customers. In this blog, we will review how to evaluate and pick the best application security testing tools, with a spotlight on the capabilities of HCL AppScan. Read more