An anonymous Slashdot reader writes: “A fugitive in Florida has been arrested by police after he used a wanted poster adorned with his mug shot for his Facebook profile picture, ” writes the International Business Times. After investigating reports of a disturbance, police discovered the 41-year-old’s Facebook profile, which revealed the man was already wanted for six months for violating his parole after two counts of battery. “Police say that as they arrested Yearwood a bag of marijuana fell out of his pocket. They charged him with possession of cannabis under 20 grams and are continuing to investigate the battery complaint.” One Twitter user jokingly suggested that the suspect should also be charged with copyright infringement — for using the police department’s photo without their permission. Read more of this story at Slashdot.
Link:
Fugitive Arrested After Using ‘Wanted’ Poster As His Facebook Profile Pic
Trailrunner7 writes from a report via On the Wire: Attackers can add an arbitrary page to the end of a Google login flow that can steal users’ credentials, or alternatively, send users an arbitrary file any time a login form is submitted, due to a bug in the login process. A researcher in the UK identified the vulnerability recently and notified Google of it, but Google officials said they don’t consider it a security issue. The bug results from the fact that the Google login page will take a specific, weak GET parameter. Using this bug, an attacker could add an extra step to the end of the login flow that could steal a user’s credentials. For example, the page could mimic an incorrect password dialog and ask the user to re-enter the password. [Aidan Woods, the researcher who discovered the bug, ] said an attacker also could send an arbitrary file to the target’s browser any time the login form is submitted. In an email interview, Woods said exploiting the bug is a simple matter. “Attacker would not need to intercept traffic to exploit — they only need to get the user to click a link that they have crafted to exploit the bug in the continue parameter, ” Woods said. Google told Woods they don’t consider this a security issue. Read more of this story at Slashdot.