MrJazsohanisharma

Meta warns of password stealing phone apps

Password-Based Hacking Could Be a Major Security Challenge

The mobile technology company has warned that the growing threat of credential-based hacking in users phones could be a major security challenge in many applications and services. According to “The Guardian”, some leading carriers are working on ways to mitigate this risk by using passwords as an authentications' mechanism. However, this will only be effective if there is proper authentication between the app developers and developers of this technology as well. The solution is for all those who have not yet developed these apps or services to use password authentication. This is because this method can help ensure that users get authentic access to their personal data even when the app has been used during any time of day and especially during the night hours and while sleeping.


Protect Your iOS Devices From Cyber-Attacks

The technology giant, however, has cautioned that password based authentication alone is not enough to guard an application from hacking. Instead, the solution should be more comprehensive with multi layer authentication methods such as biometrics and other forms of authentication. One of the issues that Meta Technologies, Inc (META) is facing is that hackers may compromise several apps at once and even steal user credentials and phone numbers and then continue to target vulnerable users. META claims that as there are about 100 million connected smartphones around the world, the most common way to attack a smartphone is through its screen. These attacks involve the exploitation of weak points in the code of applications, as well as weaknesses in web pages that enable attackers to control and install additional malware on the device. Users must take extra measures to prevent password-based hacks when using new apps and services to secure their devices. As it relates to protecting your iOS devices against cyber-attacks, there are two steps that every user can take to fend off such events for themselves: 

  1. Ensure that they do not download suspiciously installed websites; 
  2. Always keep their operating systems updated to the latest version and also update their software.

The Top 3 Vulnerabilities for iPhone Users

The top three vulnerabilities for iPhone users include memory corruption and over-reliance on C++ code. Apple has already released patches for these vulnerabilities and even created a free sandbox for Mac users that allows them to make full control of their computer without fear. Moreover, according to reports, hackers are also stealing messages which can indicate what the apps can send to the server. Also, they have discovered that many popular smartwatches have been hacked, including the Samsung Watch 4, Huawei Mate 30 and Fitbit Charge 5. All of these watches are owned by companies whose products were found dumped in forums, thus exposing the owners to potentially harmful malware. Therefore, users must verify each watch by downloading the watch or updating the firmware on the watch and then go to Settings > Software > Update & Reset. In addition, users should always connect to Wi-Fi on their devices.


Back-up and Change Password Regularly

Users must regularly change their passwords for Facebook, Gmail, YouTube, Yahoo, Instagram, LinkedIn and Microsoft Office 365. It is also recommended that users back up their data regularly so that data does not fall into the wrong hands. They can choose to share information about apps and services with family members. For example, using this feature on Facebook, you will have to select whether you want to share posts using your account or your friend’s account. On platforms like WhatsApp, you will also need to select whether to send your message to anyone or just yourself. While setting up accounts on Google Drive, you will also require providing your contacts, which are quite rare but can be beneficial. Once everything is done, make sure you remember the username and password for each platform you are sharing information with.


Protect Your Personal Information in Your Workplace

According to a recent survey, 25 percent of employees would rather be able to choose whether or not to give permission to some third party app to access personal information in their workplace, even though no specific privacy policy exists. So although we encourage users to avoid installing unwanted apps or websites on their mobiles, we advise that users do not allow any unauthorized app access to sensitive information such as payment information, date and time, password or bank account number. We advise everyone to encrypt their data whenever possible as soon as possible before giving up their device.


As for the App Store, developers should ensure that data and permissions requests do not exceed 50 MB. Developers should also ensure that they update their app’s permissions before distributing. Lastly, users must also check through the settings of the app that allow for access to the private files on their device for example, on Chrome, to make sure they are allowed to download extensions (which should be turned off), disable cookies and even add firewall rules.


We hope that our article helps all readers who are looking to protect themselves against these malicious sites that may compromise their personal data. After all, one of the main risks involved in this activity (data theft) is the possibility of hackers getting into your emails, social media profiles, and phone calls. Thus, we advise all users to practice good internet habits to defend themselves against these threats.