Hacking Facebook to remove the social value facade
We see [Ben Grosser’s] point that all the metrics found on the Facebook user interface make the experience somewhat of a game to see if you can better your high score. He thinks this detracts from the...
View ArticleUsing Facebook Ads to Prank your Friends
Most tech savvy individuals are well aware of the vast amounts of data that social networking companies collect on us. Some take steps to avoid this data collection, others consider it a trade-off for...
View ArticleSpoofedMe Attack Steals Accounts by Exploiting Social Login Mechanisms
We’ve all seen the social logon pop up boxes. You try to log into some website only to be presented with that pop up box that says, “Log in with Facebook/Twitter/Google”. It’s a nice idea in theory....
View ArticleYik Yak MITM Hack (Give the Dog a Bone)
Yik Yak is growing in popularity lately. If you are unfamiliar with Yik Yak, here’s the run down. It’s kind of like Twitter, but your messages are only shared with people who are currently within a few...
View ArticleGreat Scott! A Flux Capacitor Notification Light
If you are into your social media, then you probably like to stay updated with your notifications. [Gamaral] feels this way but he wasn’t happy with the standard way of checking the website or waiting...
View ArticleYou Can Learn a lot about Social Engineering from a Repo Man
The most vulnerable part of any secure information system is the human at the controls. Secure passwords, strong encryption, and stringent protocols are all worthless if that human can be coerced to...
View ArticleRobot’s Actions and Our Reactions
If you walk into a dog owner’s home that dog is probably going to make a beeline to see if you are a threat. If you walk into a cat owner’s home, you may see the cat wandering around, if it even...
View Article
More Pages to Explore .....