Security Researchers Find Hacking Backdoor to Facebook Messenger App

Private messages that your send through your Facebook Messenger can be read by potential hackers using a hacking backdoor in the app. This backdoor vulnerability was found by the security researchers from Check Point, who will demo it at the Info security Conference to be held today afternoon.

The security hole if unpatched could put 900 million people who use Facebook Messenger, at risk. The vulnerability was found by Check Point security researcher Roman Zaikan. Zaikan said that the backdoor allows a potential hacker to launch a man-in-the-middle (MiTM) attack into Facebook Messenger and spy/read messages without either the sender or the reader  knowing it. The hacker could also alter the messages for their own malicious gain.

Read more

Passwords Part-01

INTRODUCTION

The ancient folk tale of Ali Baba and the forty thieves mentions the use of a password. In this story, Ali Baba finds that the phrase “Open Sesame” magically opens the entrance to a cave where the thieves have hidden their treasure. Similarly, modern computer systems use pass-words to authenticate users and allow them entrance to system resources and data shares on an automated basis. The use of passwords in computer systems likely can be traced to the earliest time sharing and dial-up networks. Passwords were probably not used before then in purely batch systems.

The security provided by a password system depends on the passwords being kept secret at all times. Thus, a password is vulnerable to compromise whenever it is used, stored, or even known. In a password-based authen-tication mechanism implemented on a computer system, passwords are vulnerable to compromise due to five es-sential aspects of the password system:

Read more