Welcome to Smokey's Security Forums.
As a guest you only have limited access to the board and it's features, please consider registering to gain full access!
Registration is free and it only takes a few moments to complete.

Smokey's Security Forums

Please login or register.

Login with username, password and session length
Advanced search  

News:

A serious Tor browser flaw leaks users' real IP addresses

The so-called TorMoil flaw stems from a bug in how Firefox handles local file-based addresses.

A serious Tor browser flaw leaks users' real IP addresses

Malware Log Analysis & Removal Help * Ransomware Encryption & Decrytion Techniques * Official Jetico Inc. Support Forums

Share this topic on FacebookShare this topic on MySpaceShare this topic on RedditShare this topic on TwitterAuthorTopic: Wishbone App Hacked, Exposes 2.2M Email Addresses, 300K Phone Numbers  (Read 29 times)

0 Members and 1 Guest are viewing this topic.

QuizmasterTopic starter

  • Flying Nurse
  • Seasonal Competition Team
  • *
  • Offline Offline
  • location: USA - Miami,FL
  • Posts: 23019
  • .: Surf Queen
    • WWW
Wishbone App Hacked, Exposes 2.2M Email Addresses, 300K Phone Numbers
16 March 2017, 12:36 am

A rather popular social networking app for teens was hacked with attackers getting away with 2.2 million email addresses and some 287,000 cellphone numbers. 

The social networking app allows users to create and vote on simple quizzes with two options. In time, it has become extremely popular, especially among teenagers, something that makes this data breach that much more troublesome - many of the users affected by the incident are young people, including underage girls and boys. About 70% of users in a sample of 200 leaked accounts were under 18 years old.

App Annie places Wishbone among the top 10 most popular social networking apps for iPhones in the United States, which means there are quite a lot of users playing around with it. Mostly, it is geared towards teenagers and young adults, mostly female, one of the founders said in the past. 

Data comes from unprotected database

Troy Hunt, the security researcher... (read more)

Source: Softpedia News / Security

>> To obtain the full Softpedia Security News article, click the link in the first post line <<
 

* Permissions
You can't post new topics.
You can't post replies.
You can't post attachments.
You can't modify your posts.
BBCode Enabled
Smilies Enabled
[img] Enabled
HTML Disabled


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2017 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by Meg&Millie - Emma aka Tinker

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

    

  

Smokey's also provides free fully qualified FRST (Farbar Recovery Scan Tool) Log / Malware Analysis & Removal Help and System Health Checks
rifle
rifle
rifle
rifle