One of the biggest and most popular social networking platforms , Snapchat , has once again become the center of attention . But this time , it is for all the wrong reasons with tweets and hashtags ( # Uninstall_Snapchat and # BoycottSnapchat ) urging people to get rid of the app . Apparently , the outrage started in India , after one of Snapchat ’ s former employees said that the CEO of the company had no intention to expand the business to India since the Snapchat platform is meant for “ rich people ” and not for “ poor countries ” like India and or Spain . Enraged India first reacted on Twitter , and after that , the hacktivist group Anonymous India claimed that they were responsible for 1.7 million Snapchat users ’ data leakAttack.Databreach. The hacking group has supposedly foundVulnerability-related.DiscoverVulnerabilityvulnerabilities in Snapchat ’ s systems and managed to stealAttack.Databreach1.7 million user data and leakedAttack.Databreachthem on the dark web . It seems that the hackers belong to one of the many bug bounty hunting groups that are findingVulnerability-related.DiscoverVulnerabilityflaws in systems of big companies in exchange for money . It appears that the flaw in Snapchat ’ s security was discoveredVulnerability-related.DiscoverVulnerabilitylast year , but never reportedVulnerability-related.DiscoverVulnerabilityto the authorities . Now , the same flaw was used to steal Snapchat users data , reportsVulnerability-related.DiscoverVulnerabilityDailyMail . The hackers are also demanding that the CEO apologize or an intensive strike against Snapchat will be launched . So far , Snapchat itself hasn ’ t confirmed any data leaksAttack.Databreachand we ’ re still waiting for an official comment from the social media giant . So far , the company has claimed that the allegations are ridiculous and that the app is available worldwide for everyone who wishes to use it . A spokesperson for the company has denied everything that Snapchat is being accused of . Despite this , the outrage on the social media continues , and many are still persuading others to boycott the application , or better yet – to completely uninstall it . The ratings of the company have dropped down fast , and the app is currently rated with only one star on the Apple ’ s App Store , while before this ‘ incident ’ it had a full five-star rating . And when it comes to Google Play Store , the app has a four-star rating at the time of writing . It ’ s unknown what will happen with the company now that their reputation has dropped down so dramatically , but whatever they decide to do to fixVulnerability-related.PatchVulnerabilitythis , they better do it fast .
IP cameras manufactured by Chinese vendor Fosscam are riddledVulnerability-related.DiscoverVulnerabilitywith security flaws that allow an attacker to take over the device and penetrate your network . The issues came to light yesterday when Finnish cyber-security firm F-Secure publishedVulnerability-related.DiscoverVulnerabilityits findings after Fosscam failed to answer bug reportsVulnerability-related.DiscoverVulnerabilityand patchVulnerability-related.PatchVulnerabilityits firmware . Below is a list of 18 vulnerabilities researchers discoveredVulnerability-related.DiscoverVulnerabilityin Fosscam IP cameras : The variety of issues F-Secure researchers discoveredVulnerability-related.DiscoverVulnerabilitymeans there are multiple ways an attacker can hack one of these devices and use it for various operations . `` For example , an attacker can view the video feed , control the camera operation , and upload and download files from the built-in FTP server , '' F-Secure says. `` They can stop or freeze the video feed , and use the compromised device for further actions such as DDoS or other malicious activity . '' `` If the device is in a corporate local area network , and the attacker gains access to the network , they can compromise the device and infect it with a persistent remote access malware . The malware would then allow the attacker unfettered access to the corporate network and the associated resources , '' researchers added . F-Secure researchers sayVulnerability-related.DiscoverVulnerabilityall these vulnerabilities have been confirmedVulnerability-related.DiscoverVulnerabilityin Fosscam C2 models , but also in Opticam i5 , an IP camera sold by another vendor , but based on a white-label Fosscam device . In fact , researchers suspect that Fosscam has sold the vulnerable IP camera model as a white-label product , which other companies bought , plastered their logo on top , and resold as their own devices . F-Secure says it identified 14 other vendors that sell Fosscam made cameras , but they have not tested their products as of yet . F-Secure recommends that network administrators remove any Fosscam made IP camera from their network until the Chinese company patchesVulnerability-related.PatchVulnerabilityits firmware .
Remember that giant poster that Apple put up in Las Vegas during the recent Consumer Electronics Show that stated what happens on your iPhone , stays on your iPhone ? I 'm willing to bet many at Apple are trying hard to forget it right now as news breaksVulnerability-related.DiscoverVulnerabilityof a vulnerability in the group functionality of its FaceTime application that allows users to eavesdrop on the people being called , even if they did n't pick up the call ! The shockingly simple exploit works with any pair of iOS devices running iOS 12.1 or later . `` The bug lets you call anyone with FaceTime , and immediately hear the audio coming from their phone - before the person on the other end has accepted or rejected the incoming call '' according to Benjamin Mayo at 9to5Mac who first broke the story and adds `` there 's a second part to this which can expose video too ... '' The exploit really is stupidly easy to pull off , essentially just requiring the caller to add their own number while a call is dialing in order to start a group chat that includes themselves and the audio of the person being called . It does n't matter if the recipient has accepted the call or not , all audio captured while the iPhone is ringing can be heard by the caller . If the recipient presses the power button from the lockscreen , used to accept or reject the incoming FaceTime chat , then video is also sent to the caller . One user , @ Jessassin , tweeted that if you join the call using your invitation on another iPhone then you also get the video stream despite the call not being answered on the destination device . What 's more , the bug is n't limited to iPhone users and if the recipient is using a Mac then , as it rings for a longer default than a handset , the eavesdroppingAttack.Databreachcan potentially continue for a longer period . This is particularly worrying as a Mac user may well be away from the device for a long , certainly more so than we are from our smartphones , and during that time anyone could be listening in on whatever was happening in that house or office . So , what do you need to do now ? The good news is that Apple has responded by temporarily suspending the Group FaceTime functionality until a permanent fix can be rolled outVulnerability-related.PatchVulnerability. An Apple spokesperson told BuzzFeed that a fix `` will be releasedVulnerability-related.PatchVulnerabilityin a software update later this week . '' However , there have been reportsVulnerability-related.DiscoverVulnerabilityof some users still able to exploit the eavesdropping vulnerability even after Apple made this announcement , 9to5Mac being among them .
It lets users send out text messages as well as audio messages , videos and pictures . It is also possible to personalize the messages sent via iMessage with a variety of animations using other Apple apps . This particular app is compatible with iOS , watchOS and macOS . Basically , it is a very widely used app by iPhone users . So when there is a bug in the app that is so severe that it can crash the phone easily , then users are bound to get concerned . According to reportsVulnerability-related.DiscoverVulnerability, there is a nefarious text message that is being sent to iPhone users even on those phones that run on the latest iOS 10 . This message is quite troublesome for users because it has the power to crash their phones within minutes . The new iMessage hack lets the attackers disable the Message app through sending an extensive contact record . This record file is pretty huge so as soon as the user taps on the recorded message , it immediately over-burdens the OS and terminates the app . The problem is that iPad and iPhone users who use iOS8 to iOS10.2.1 versions can not do anything to prevent this assault . The most disturbing part of the hack is that it is very difficult to prevent or avoid unless the recipient of the message is aware of what is to be done . Generally , users reboot their device or restart the iMessage app , which certainly doesn ’ t resolve the issue . Another aspect to be noted is that this hack can be distributed by the victim himself to other contacts . Here is how it can be done : Download the contact file , upload the contacts in dropbox or iCloud Drive , share this file using iMessage to the person you want to get hacked , wait until the victim taps on it and the app will instantly freeze . This time , the attackers have tried a different strategy to hack iMessage app ; previously they used to send infected links or weird text messages but this time they just send a huge contact file to disable the app