Syber Group
Toll Free : 855-568-TSTG(8784)
Subscribe To : Envelop Twitter Facebook Feed linkedin

Facebook’s Users Info Was Leaked

May 12, 2011 by  
Filed under Around The Net

Comments Off on Facebook’s Users Info Was Leaked

Facebook users’ personal information could have been accidentally leaked to third parties, in particular advertisers, over the past several years, Symantec Corp said in one of its blog postings.

Third-parties would have had access to personal information such as profiles, photographs and chat, and could have had the ability to post messages, the security software company stated.

“We estimate that as of April 2011, close to 100,000 applications were enabling this leakage,” the blog post said.

” … Over the years, hundreds of thousands of applications may have inadvertently leaked millions of access tokens to third parties,” posing a security threat, the blog post said.

The third-parties may not have realized their ability to access the information, it said.

Facebook, the world’s largest social networking website, was notified of this issue and confirmed the leakage, the blog post said.

It said Facebook has taken steps to resolve the issue.

“Unfortunately, their (Symantec’s) resulting report has a few inaccuracies. Specifically, we have conducted a thorough investigation which revealed no evidence of this issue resulting in a user’s private information being shared with unauthorized third parties,” Facebook spokeswoman Malorie Lucich said in a statement.

Read More…

Is Twitter Finally Getting A Competitor?

April 16, 2011 by  
Filed under Internet

Comments Off on Is Twitter Finally Getting A Competitor?

Twitter your days alone at the top of the micro-blogging mountain may soon be ending. UberMedia, which owns major third-party mobile applications for the Twitter platform, is said to be building a service that will compete directly against Twitter. If it’s true, the move would come on the heels of Twitter briefly suspending the company’s apps for alleged use policy violations.

Citing unnamed sources, CNN.com reported today that UberMedia is looking to attract users to its own microblogging service by addressing common complaints about Twitter, such as its rules on message lengths as well as how the service can be confusing to new users.

UberMedia declined to comment on whether its programmers are building a new microblogging service. However, in an emailed statement to Computerworld, company marketing chief Steve Chadima said, “Our foremost desire is to continue to innovate on the Twitter platform and bring more users and usage to Twitter.”

UberMedia owns UberTwitter, which is for the BlackBerry platform; Twidroyd, for Android devices; and UberCurrent, which can be used on iPhones and iPads. The company also has been in the news in recent months because it’s moving to acquire popular Twitter client TweetDeck.

TweetDeck competes directly with Twitter’s Web and mobile clients.

Ezra Gottheil, an analyst with Technology Business Research, said he wouldn’t be surprised if UberMedia were to go after some of Twitter’s business, but the company would have an uphill climb.

Hacker Writes Trojan For Apple’s Mac

March 1, 2011 by  
Filed under Computing

Comments Off on Hacker Writes Trojan For Apple’s Mac

As Apple’s popularity continues to increase, so too does the malicious interest of hackers in their famed products. Researchers at Sophos say they’ve uncovered a new Trojan horse program written for the Mac.

It’s called the BlackHole RAT (the RAT part is for “remote access Trojan”) and it’s pretty easy to find online in hacking forums, according to Chet Wisniewski a researcher with antivirus vendor Sophos. There’s even a YouTube video demo of the program that details what its capable of doing.

Sophos hasn’t seen the Trojan used in any online attacks -it’s more a bare-bones, proof-of-concept beta program right now – but the software is pretty easy to use, and if a criminal could find a way to get a Mac user to install it, or write attack code that would silently install it on the Mac, it would give him remote control of the hacked machine. Read More….

« Previous Page