Instagram vulnerability was discovered by one Israeli hacker, known by the name @ ZHacker13.
How malicious vulnerability can be used hackers;
Hackers can use a simple "brute force algorithm" to check the phone numbers associated with their Instagram account.
Then the attackers try to find the account name. To do this they take advantage of the Contact Sync feature available on Instagram.
By following a simple procedure, hackers are able to access victims' accounts.
@ ZHacker13 said that using the vulnerability, he managed to get it all your account details users as well as phone numbers, which were linked to the accounts.
To show how serious this particular one is vulnerability, the hacker said he could build a database with the data millions of users Instagram. He explained that opening 40 accounts gave him access (randomly) to a huge number of items that belonged to other accounts.
Vulnerability Report to Facebook
Recently, Facebook faced another incident of abuse of its users. An unprotected server resulted in leakage a database containing the details of 419 million Facebook accounts, as well as the phone number of users.
How useful was this post?
Average rating / 5. Vote count:
No votes so far! Be the first to rate this post.