Egypt-based security researcher reported that Facebook Camera App for mobiles are Vulnerable to Man in The Middle Attack, that allow an attacker to tap the network and hijack Camera users accounts and information like email addresses and passwords can be stolen.
Mohamed Ramadan trainer with Attack-Secure, who previously reported us about similar vulnerability in Etsy app for iPhone
Mohamed explains "The problem is that the app accepts any SSL
certification from any source, even evil SSL certifications, and this
enables any attacker to perform man in the middle attacks against anyone
who uses the Facebook Camera app for IPhone. This means that the
application doesn’t warn the user if someone in the same (Wi-Fi network)
is trying to hijack his or her Facebook account."
Facebook suggest users to upgrade the Camera application To Version 1.1.2. A statement released by the company says “We
applaud the security researcher who brought this bug to our attention
for responsibly reporting the bug to our White Hat Program. We worked
with the team to make sure we understood the full scope of the bug,
which allowed us to fix it and upgrade the Camera application without
any evidence that this bug was exploited in the wild. Users are only
vulnerable if they are using an unsecured or untrusted public wireless
network and an older version of the application."
"As always, we remind all users to only connect to networks they
trust. Users can protect themselves by downloading the latest version of
the Camera app. Due to the responsible reporting of this issue to
Facebook, no one within the security community has evidence of account
compromise using this bug. We have provided a bounty to the researcher
to thank them for their contribution to Facebook Security.”
Facebook suggest users to upgrade the Camera application To Version 1.1.2.
Facebook suggest users to upgrade the Camera application To Version 1.1.2.
YOU NEED TO HIRE A HACKER, THEN CONTACT TIMNEX.
ReplyDeleteYou will come across so many adverts in comment section most with enticing stories and false testimonies and witness statements. You have to understand that this are mainly scammers trying to lure you so they can take your money.
HERE IS HOW TO IDENTIFY A LEGIT HACKER.
HACKERS USE SOFTWARE. Hacking takes more of skill and the use of softwares that aren’t accessible to everyone, most of this software are designed specifically for specific tasks and are hidden from the general public, only hackers would know of their existence and how to get them. Anyone claiming to be able to hack without telling you about the use of software could be a false hacker.
HACKERS GIVE YOU DETAILED BREAK DOWN OF HOW THEY WOULD HANDLE A JOB. A hacker will give you a proper understanding of how he will execute a job, duration of the job and guaranteeing your safety so as the job wouldn’t be traced back to you.
HACKERS USE SECURE PAYMENT METHODS. In other to use a hacker services you will need a secure payment method which the hacker would provide for you. Make sure to use payment that wouldn’t have your details, such as name, residence address or ID details.
There are other ways to identify a hacker, we have only pointed out the top 3 details you should look out for.
All this details mentioned above are what TimNex guarantees, there are literally no limits to services we could provide and we guarantee a full refund to any payment made for a service or task we couldn’t complete.
Contact us using the email below
Info@tdontimnex. com