<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Touch Reviews | RSS Feed</title>
	<atom:link href="/tag/security-hole/feed/" rel="self" type="application/rss+xml" />
	<link>https://touchreviews.net</link>
	<description>iPhone, iPad Games, Apps, Reviews, News</description>
	<lastBuildDate>Fri, 10 Apr 2015 17:18:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1.1</generator>
	<item>
		<title>Snapchat Security Breach Affects 4.6 Million Users</title>
		<link>https://touchreviews.net/snapchat-security-breach-affects-46-million-users/</link>
		<comments>https://touchreviews.net/snapchat-security-breach-affects-46-million-users/#comments</comments>
		<pubDate>Fri, 03 Jan 2014 00:35:52 +0000</pubDate>
		<dc:creator><![CDATA[Ravin]]></dc:creator>
				<category><![CDATA[Mobile Technology]]></category>
		<category><![CDATA[database]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[security breach]]></category>
		<category><![CDATA[security hole]]></category>
		<category><![CDATA[snapchat]]></category>
		<category><![CDATA[Social Network]]></category>
		<category><![CDATA[Social Networking]]></category>

		<guid isPermaLink="false">https://touchreviews.net/?p=23212</guid>
		<description><![CDATA[<p><a href='http://rss.buysellads.com/click.php?z=1260104&k=6c91b39f615bce11ad658feb78295cc1&a=23212&c=1168762234' target='_blank' rel='nofollow'>
				<img src='http://rss.buysellads.com/img.php?z=1260104&k=6c91b39f615bce11ad658feb78295cc1&a=23212&c=1168762234' border='0' alt='' /></a></p><br />Snapchat a social networking app popular for sharing photos with friends that self-destruct after a few seconds has had a security breach. The servers of Snapchat were hacked that has resulted in usernames and mobile numbers of over 4.6 million users being exposed and possibly available on the internet. According to reports, Gibson Security on August 27, 2013 had pointed ... <a href="/snapchat-security-breach-affects-46-million-users/" class="more-link">Read More</a>]]></description>
				<content:encoded><![CDATA[<p><a href='http://rss.buysellads.com/click.php?z=1260104&k=6c91b39f615bce11ad658feb78295cc1&a=23212&c=1665687249' target='_blank' rel='nofollow'>
				<img src='http://rss.buysellads.com/img.php?z=1260104&k=6c91b39f615bce11ad658feb78295cc1&a=23212&c=1665687249' border='0' alt='' /></a></p><br /><p><a href="http://i1.wp.com/touchreviews.net/wp-content/uploads/2014/01/Snapchat-security-breach.jpeg"><img class="alignnone size-full wp-image-23213" alt="Snapchat security breach" src="http://i1.wp.com/touchreviews.net/wp-content/uploads/2014/01/Snapchat-security-breach.jpeg?resize=749%2C421" data-recalc-dims="1" /></a></p>
<p>Snapchat a social networking app popular for sharing photos with friends that self-destruct after a few seconds has had a security breach. The servers of Snapchat were hacked that has resulted in usernames and mobile numbers of over 4.6 million users being exposed and possibly available on the internet.</p>
<p>According to <a href="http://techcrunch.com/2014/01/02/snapchat-says-its-improving-its-app-service-to-prevent-future-leaks/" target="_blank">reports</a>, Gibson Security on August 27, 2013 had pointed out flaws in Snapchat&#8217;s &#8220;Find Friends&#8221; feature. The exploits were recently made public and as a result hackers were able to access information from Snapchat servers.</p>
<blockquote><p>Find Friends is an optional service that asks Snapchatters to enter their phone number so that their friends can find their username. This means that if you enter your phone number into Find Friends, someone who has your phone number in his or her address book can find your username.</p></blockquote>
<p>Snapchat has posted a blog post <a title="Find Friends Abuse" href="http://blog.snapchat.com/post/72013106599/find-friends-abuse" target="_blank">acknowledging the security breach</a> and explained how the hackers got the information:</p>
<blockquote><p>&#8230; it was possible for an attacker to use the functionality of Find Friends to upload a large number of random phone numbers and match them with Snapchat usernames. On New Years Eve, an attacker released a database of partially redacted phone numbers and usernames. No other information, including Snaps, was leaked or accessed in these attacks.</p></blockquote>
<p>This security breach is clearly a result of Snapchat not working quick enough to patch the security holes in time. The flaws had been exposed 4 months ago however, the company failed to take action which has now resulted in 4.6 million unhappy users.</p>
<p>The developers are now working on an updated version of the app that will allow users to opt-out of Find Friends feature and will be &#8220;improving rate limiting and other restrictions&#8221; to avoid such attacks.</p>
<p>Snapchat was recently approached by Facebook for acquisition for about $3 billion however, the company refused the offer. The social networking app to share photos and short video clips is popular among teenagers. Sharing photos without leaving any tracks behind has proved to a successful strategy behind Snapchat&#8217;s user base.</p>
<p>Gibson Security has put up a website &#8220;<a title="GS Lookup - Snapchat" href="http://lookup.gibsonsec.org/lookup" target="_blank">GS Lookup &#8211; Snapchat</a>&#8221; to allow users to check if their details were stolen by entering their username on the website. The site notes that only specific areas of America were included. It also suggests some steps you could take in case your details were stolen.</p>
<p>This is not the first time such a security breach has happened in a social networking application. Recently even Skype was targeted by hackers during the holiday season.</p>
]]></content:encoded>
			<wfw:commentRss>https://touchreviews.net/snapchat-security-breach-affects-46-million-users/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Apple Releases Trojan Flashback Removal Tool For OS X Lion Without Java</title>
		<link>https://touchreviews.net/apple-releases-trojan-flashback-removal-tool-os-x-lion-without-java/</link>
		<comments>https://touchreviews.net/apple-releases-trojan-flashback-removal-tool-os-x-lion-without-java/#comments</comments>
		<pubDate>Mon, 23 Apr 2012 16:41:41 +0000</pubDate>
		<dc:creator><![CDATA[Kaled Ali]]></dc:creator>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[apple releases]]></category>
		<category><![CDATA[Flash]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[mac os x]]></category>
		<category><![CDATA[operating system]]></category>
		<category><![CDATA[os x lion]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[security hole]]></category>
		<category><![CDATA[Software Update]]></category>

		<guid isPermaLink="false">https://touchreviews.net/?p=19890</guid>
		<description><![CDATA[<p><a href='http://rss.buysellads.com/click.php?z=1260104&k=6c91b39f615bce11ad658feb78295cc1&a=19890&c=581697100' target='_blank' rel='nofollow'>
				<img src='http://rss.buysellads.com/img.php?z=1260104&k=6c91b39f615bce11ad658feb78295cc1&a=19890&c=581697100' border='0' alt='' /></a></p><br />In recent weeks, a plague has overtaken the Mac OS X operating system, called the Trojan Flashback. The Flashback malware allows hackers access to personal information of Mac users, by extracting the info via a security hole in Java as well as other recent social engineering methods. With Java being the main culprit here, Apple has made a quick and ... <a href="/apple-releases-trojan-flashback-removal-tool-os-x-lion-without-java/" class="more-link">Read More</a>]]></description>
				<content:encoded><![CDATA[<p><a href='http://rss.buysellads.com/click.php?z=1260104&k=6c91b39f615bce11ad658feb78295cc1&a=19890&c=497029634' target='_blank' rel='nofollow'>
				<img src='http://rss.buysellads.com/img.php?z=1260104&k=6c91b39f615bce11ad658feb78295cc1&a=19890&c=497029634' border='0' alt='' /></a></p><br /><p><a href="http://i1.wp.com/touchreviews.net/wp-content/uploads/2012/04/Apple-Releases-Trojan-Flashback-Removal-Tool-For-OS-X-Lion-Without-Java.jpg"><img class="aligncenter size-full wp-image-19891" title="Apple Releases Trojan Flashback Removal Tool For OS X Lion Without Java" src="http://i1.wp.com/touchreviews.net/wp-content/uploads/2012/04/Apple-Releases-Trojan-Flashback-Removal-Tool-For-OS-X-Lion-Without-Java.jpg?resize=441%2C181" alt="" data-recalc-dims="1" /></a></p>
<p>In recent weeks, a <a title="Researchers Confirm Flashback Trojan Infects 600000 Macs, Used For Click Fraud" href="http://www.forbes.com/sites/andygreenberg/2012/04/06/researchers-confirm-flashback-trojan-infects-600000-macs-being-used-for-clickfraud/" target="_blank">plague has overtaken</a> the Mac OS X operating system, called the Trojan Flashback. The Flashback malware allows hackers access to personal information of Mac users, by extracting the info via a security hole in Java as well as other recent social engineering methods. With Java being the main culprit here, Apple has made a quick and decisive move by releasing a removal tool via Software Update on all Macs running OS X Lion without Java installed.</p>
<blockquote><p><strong>About Flashback malware removal tool</strong></p>
<p>This Flashback malware removal tool that will remove the most common variants of the Flashback malware.</p>
<p>If the Flashback malware is found, a dialog will be presented notifying the user that malware was removed.</p>
<p>In some cases, the Flashback malware removal tool may need to restart your computer in order to completely remove the Flashback malware.</p>
<p>This update is recommended for all OS X Lion users without Java installed.</p></blockquote>
<p>This tool rids the OS X system of all viruses present in the system, related to the Trojan Flashback malware. Java does not come pre-installed on the Mac, and therefore allows Apple’s removal tool to figure out as to where the virus is originating. The Flashback virus has been a huge issue in the media, with a <a title="Mac Flashback Trojan Affecting Thousands" href="http://www.huffingtonpost.com/2012/04/05/mac-flashback-trojan_n_1405766.html" target="_blank">reported 600,000 Mac users</a> being affected by this virus.</p>
<p>{via <a title="Apple Releases Flashback Removal Tool for Macs Running OS X Lion without Java" href="http://www.macrumors.com/2012/04/13/apple-releases-flashback-removal-tool-for-macs-running-os-x-lion-without-java/" target="_blank">MacRumors</a>}</p>
]]></content:encoded>
			<wfw:commentRss>https://touchreviews.net/apple-releases-trojan-flashback-removal-tool-os-x-lion-without-java/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Fix for JailbreakMe the iOS 4 PDF Font Security Hole (Jailbreak Required)</title>
		<link>https://touchreviews.net/fix-jailbreakme-ios-4-pdf-font-security-hole/</link>
		<comments>https://touchreviews.net/fix-jailbreakme-ios-4-pdf-font-security-hole/#comments</comments>
		<pubDate>Tue, 03 Aug 2010 17:12:36 +0000</pubDate>
		<dc:creator><![CDATA[Stephen Northcott]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[arbitrary code]]></category>
		<category><![CDATA[iOS]]></category>
		<category><![CDATA[iPad]]></category>
		<category><![CDATA[iPhone]]></category>
		<category><![CDATA[iphone 4]]></category>
		<category><![CDATA[jailbreak iphone]]></category>
		<category><![CDATA[jailbreak iphone 4]]></category>
		<category><![CDATA[jailbreakme]]></category>
		<category><![CDATA[mobile safari]]></category>
		<category><![CDATA[pdf file]]></category>
		<category><![CDATA[PDF Font Security Hole]]></category>
		<category><![CDATA[security hole]]></category>
		<category><![CDATA[unlock iphone 4]]></category>
		<category><![CDATA[web page]]></category>

		<guid isPermaLink="false">https://touchreviews.net/?p=8401</guid>
		<description><![CDATA[<p><a href='http://rss.buysellads.com/click.php?z=1260104&k=6c91b39f615bce11ad658feb78295cc1&a=8401&c=769955672' target='_blank' rel='nofollow'>
				<img src='http://rss.buysellads.com/img.php?z=1260104&k=6c91b39f615bce11ad658feb78295cc1&a=8401&c=769955672' border='0' alt='' /></a></p><br />The recent Mobile Safari based jailbreak exploit takes advantage of a bug in Apple&#8217;s PDF font rendering frameworks to have your iPhone 4, iPad or iPod Touch execute a piece of code. Whilst this is very handy if you want to jailbreak your iPhone with jailbreakme, it actually means that any web site can run anything it wants on any ... <a href="/fix-jailbreakme-ios-4-pdf-font-security-hole/" class="more-link">Read More</a>]]></description>
				<content:encoded><![CDATA[<p><a href='http://rss.buysellads.com/click.php?z=1260104&k=6c91b39f615bce11ad658feb78295cc1&a=8401&c=742561980' target='_blank' rel='nofollow'>
				<img src='http://rss.buysellads.com/img.php?z=1260104&k=6c91b39f615bce11ad658feb78295cc1&a=8401&c=742561980' border='0' alt='' /></a></p><br /><p style="text-align: justify;">The recent Mobile Safari based jailbreak exploit takes advantage of a bug in Apple&#8217;s PDF font rendering frameworks to have your iPhone 4, iPad or iPod Touch execute a piece of code.</p>
<p style="text-align: justify;">Whilst this is very handy if you want to jailbreak your iPhone with jailbreakme, it actually means that any web site can run anything it wants on any iPhone, iPod or iPad. All someone has to do is get you to navigate to a web page with the malicious PDF file on it.</p>
<p style="text-align: justify;">Unfortunately unless you jailbreak your iPhone you are going to have to wait for Apple to issue a  full iOS update to fix this security hole. In the meantime be careful of the sites you visit. If you are duped you will not be given the option to not download the PDF once you have clicked on the page it is on.</p>
<p style="text-align: justify;">If you have jailbroken your device, or plan to, then Cult Of Mac has published details of how to patch your iPhone, iPad or iPod Touch running iOS 4, so that it is not vulnerable anymore. This patch installs a pop up that asks you if you are sure when you try to open a PDF file..</p>
<p style="text-align: justify;">From Cult Of Mac :</p>
<blockquote style="text-align: justify;"><p>This patch doesn’t fix the hole, but it does pop up a warning asking you if you want to open a .PDF file. If you trust the source of the PDF file, you hit ‘Load.’ If not, ‘Cancel.’</p>
<p>Download this this .deb file from Will Strafach (@cdevwill) and open it on your your iOS device using iFile, a file manager that can be installed using Cydia. (Note: Strafach says he’s working on an easy-to-use app to install the .deb file that will be released to Cydia on Tuesday as PDF Loading Warner).</p>
<p>Navigate to /var/mobile<br />
Double tap the .deb file to install it.</p>
<p>If you navigate to a website that tries to automatically open a PDF file, the following warning box will pop up:</p>
<p>“View File? The application wants to display a PDF on your device. There is a known bug in the PDF loading code that makes the running of arbitrary code possible, which could compromise your system. Are you sure you want to continue?”</p></blockquote>
<p style="text-align: justify;">If you use this patch please let us know in the comments how it is behaving for you..</p>
]]></content:encoded>
			<wfw:commentRss>https://touchreviews.net/fix-jailbreakme-ios-4-pdf-font-security-hole/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
