Featured Articles

TSMC: Volume production of 16nm FinFET in 2H 2015

TSMC: Volume production of 16nm FinFET in 2H 2015

TSMC has announced that it will begin volume production of 16nm FinFET products in the second half of 2015, in late…

More...
AMD misses earnings targets, announces layoffs

AMD misses earnings targets, announces layoffs

AMD has missed earnings targets and is planning a substantial job cuts. The company reported quarterly earnings yesterday and the street is…

More...
Did Google botch the Nexus 6 and Nexus 9?

Did Google botch the Nexus 6 and Nexus 9?

As expected, Google has finally released the eagerly awaited Nexus 6 phablet and its first 64-bit device, the Nexus 9 tablet.

More...
Gainward GTX 970 Phantom previewed

Gainward GTX 970 Phantom previewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
EVGA GTX 970 SC ACX 2.0 reviewed

EVGA GTX 970 SC ACX 2.0 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Wednesday, 24 July 2013 09:29

Syrians bring down Viber

Written by Nick Farrell

It is spying on users

The Syrian Electronic Army has hacked into Viber, the popular VOIP messaging app. The free phonecall and texting app’s website has been hit and resulted in Viber’s Support and Knowledgebase website being commandeered by the hacking group, and private data about users published on the web.

This is the second result for the SEA which a few days ago nicked details of millions of Tango users, another mobile messaging app. According to security expert Graeme Cluely Viber’s support website at http://support.viber.com/ was defaced to read:

“Hacked by Syrian Electronic Army

Dear All Viber Users, 

The Israeli-based "Viber" is spying and tracking you. We weren't able to hack all Viber systems, but most of it is designed for spying and tracking.”

Embedded within the defaced webpage is a link to a screencapture of what appears to be an internal database by Viber employees showing users’ phone numbers, device UDID, country, IP address, operating system and version, first registration to Viber, and what version of Viber they are using. 

In addition, at the bottom of the defaced webpage, the hackers published the names, phone numbers and email addresses of Viber administrators.

Nick Farrell

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments