More than 4,000 Android apps that use Google's cloud-hosted Firebase databases are 'unknowingly' leaking sensitive information on their users, including their email addresses, usernames, passwords, phone numbers, full names, chat messages and location data. The investigation, led by Bob Diachenko from Security Discovery in partnership with Comparitech, is the result of an analysis of 15,735 Android apps, which comprise about 18 percent of all apps on Google Play store. "4.8 percent of mobile apps using Google Firebase to store user data are not properly secured, allowing anyone to access databases containing users' personal information, access tokens, and other data without a password or any other authentication," Comparitech said Acquired by Google in 2014, Firebase is a popular mobile application development platform that offers a variety of tools to help third-party app developers build apps, securely store app data and files, fix issues, and even engag...
Fundamentally There Are Seven Steps Of A Cyber Attack: Step 1 : Reconnaissance This is Step in which a hacker tries to identify the system and checks for vulnerability and the best way to hack it ( This process happens before the attack ). Step 2 : Scanning After Reconnaissance, the next step is scanning in this step hacker tries to identify a weak point that allows the hacker access to the system or gain some privilege. Step 3 : Access and Escalation After Scanning the hacker's next step is to gain access and then escalate privileges to allow the attacker to move freely within the environment. Once the attacker has access and privileges are escalated, they have effectively taken over your system. Step 4 : Exfiltration In this step the hacker now seeks data,sensitive information, logs and everything that he can possible get form the system and then hacker extracts this data to his/her server or any means to steal it. Step 5 : Sustainment In thi...
Top 5 Text Editors Programmers Use: 1. Atom Atom is a free and open-source text and source code editor for macOS, Linux, and Microsoft Windows with support for plug-ins written in Node.js, and embedded Git Control, developed by GitHub. Atom is a desktop application built using web technologies. 2. Sublime Text Sublime Text is a shareware cross-platform source code editor with a Python application programming interface. It natively supports many programming languages and markup languages, and functions can be added by users with plugins, typically community-built and maintained under free-software licenses 3. gedit gedit is the default text editor of the GNOME desktop environment and part of the GNOME Core Applications. Designed as a general-purpose text editor, gedit emphasizes simplicity and ease of use, with a clean and simple GUI, according to the philosophy of the GNOME project 4. Vim Vim is a clone, with additions, of Bill Joy's vi text editor program for Unix. Vim's autho...
Comments
Post a Comment