Thursday, January 3, 2013

Facebook Camera App Vulnerable To Man In The Middle Attack

Egypt-based security researcher reported that Facebook Camera App for mobiles are Vulnerable to Man in The Middle Attack, that allow an attacker to tap the network and hijack Camera users accounts and information like email addresses and passwords can be stolen.
Facebook Camera App Vulnerable to Man in The Middle Attack
Mohamed Ramadan trainer with Attack-Secure, who previously reported us about similar vulnerability in Etsy app for iPhone
Mohamed explains "The problem is that the app accepts any SSL certification from any source, even evil SSL certifications, and this enables any attacker to perform man in the middle attacks against anyone who uses the Facebook Camera app for IPhone. This means that the application doesn’t warn the user if someone in the same (Wi-Fi network) is trying to hijack his or her Facebook account."
Facebook suggest users to upgrade the Camera application To Version 1.1.2. A statement released by the company says “We applaud the security researcher who brought this bug to our attention for responsibly reporting the bug to our White Hat Program. We worked with the team to make sure we understood the full scope of the bug, which allowed us to fix it and upgrade the Camera application without any evidence that this bug was exploited in the wild. Users are only vulnerable if they are using an unsecured or untrusted public wireless network and an older version of the application."

"As always, we remind all users to only connect to networks they trust. Users can protect themselves by downloading the latest version of the Camera app. Due to the responsible reporting of this issue to Facebook, no one within the security community has evidence of account compromise using this bug. We have provided a bounty to the researcher to thank them for their contribution to Facebook Security.

Facebook suggest users to upgrade the Camera application To Version 1.1.2.

1 comment:

  1. YOU NEED TO HIRE A HACKER, THEN CONTACT TIMNEX.

    You will come across so many adverts in comment section most with enticing stories and false testimonies and witness statements. You have to understand that this are mainly scammers trying to lure you so they can take your money.

    HERE IS HOW TO IDENTIFY A LEGIT HACKER.

    HACKERS USE SOFTWARE. Hacking takes more of skill and the use of softwares that aren’t accessible to everyone, most of this software are designed specifically for specific tasks and are hidden from the general public, only hackers would know of their existence and how to get them. Anyone claiming to be able to hack without telling you about the use of software could be a false hacker.

    HACKERS GIVE YOU DETAILED BREAK DOWN OF HOW THEY WOULD HANDLE A JOB. A hacker will give you a proper understanding of how he will execute a job, duration of the job and guaranteeing your safety so as the job wouldn’t be traced back to you.


    HACKERS USE SECURE PAYMENT METHODS. In other to use a hacker services you will need a secure payment method which the hacker would provide for you. Make sure to use payment that wouldn’t have your details, such as name, residence address or ID details.

    There are other ways to identify a hacker, we have only pointed out the top 3 details you should look out for.

    All this details mentioned above are what TimNex guarantees, there are literally no limits to services we could provide and we guarantee a full refund to any payment made for a service or task we couldn’t complete.

    Contact us using the email below
    Info@tdontimnex. com







    ReplyDelete