Protect The Graph

  • Facebook Open-Sourced Security Tool osquery in Action

    … infrastructure. Reed wrote: An osquery deployment can help you establish an infrastructural baseline, allowing you to detect malicious activity using scheduled queries. This approach will help you catch known malware (WireLurker, IceFog, Imuler, etc.) and, more important, unknown malware. As an illustrative example, let’s look at Mac OS X startup…

    David Cohen/ AllFacebookin Social- 7 readers -
  • Facebook Tests Onion URL for Tor Users

    … Facebook is experimenting with ways for security-conscious users to access the social network via Tor, and Alec Muffett, a software engineer for security infrastructure in the company’s London office, described the process in a note on the Protect the Graph page. He wrote: It’s important to us at Facebook to provide methods for people to use…

    David Cohen/ AllFacebookin Social Facebook- 6 readers -
  • How Facebook Protected Users with Dormant Yahoo Email Accounts

    When Yahoo announced last year that it would allow user names that had been inactive to be claimed by new users, how did Facebook ensure that accounts on the social network that were tied to recycled Yahoo email addresses remained secure? Software engineer Murray Kucherawy detailed the process in a note on the Protect the Graph page.

    David Cohen/ AllFacebook- 10 readers -
  • Facebook Teams Up with USENIX to Award Internet Defense Prize

    …, "Static Detection of Second-Order Vulnerabilities in Web Applications." Facebook Security Engineering Manager John "Four" Flynn, who served on the award committee for the Internet Defense Prize, described the work by Dahse and Holz in a note on the Protect the Graph page: The researchers used static analysis to detect "second-order vulnerabilities…

    David Cohen/ AllFacebookin Social- 1 readers -
Get the top posts daily into your mailbox!
2 Blogs about the topic

More from around the web