x

Like our Facebook Page

   
Early Times Newspaper Jammu, Leading Newspaper Jammu
 
Breaking News :   Ladakh: BJP drops Namgyal, fields Tashi | “Shut up please”: Sajad Lone’s suggestion to NC leaders amid intense campaigning | PDP has become BJP's C-team, says Omar | Mehbooba’s assets decline by Rs 13 lakhs in 5-yrs | ‘Even listening to Hanuman Chalisa becomes crime under Cong rule’ | CAT warns stern action against DHSK | 8 smugglers booked under NDPS Act | Centre effects Joint-Secy level reshuffle | Two booked under PSA | 5 more candidates file papers | Humanity Public School celebrated “Earth Day” | Govt Degree College Darhal celebrates Earth Day | GDC Kunjwani organised Pledge taking ceremony under SVEEP | Toyota Kirloskar Motor announces launch of Fortuner Leader Edition | Documentary on Voting Awareness Showcased at Govt College for Women | Laparoscopic Surgery performed at Sub District Hospital Bhaderwah | GDC Vijaypur organizes Special Lecture on Drug Abuse | Azad Retreats | Back Issues  
 
news details
Hackers can crack your Tinder account password with just a phone number
2/22/2018 11:33:11 AM
Agencies
It was reported last month that online dating app Tinder had a security flaw which allows strangers to see your photos and matches. Now, Appsecure has discovered a new flaw which is potentially more damaging.

The new vulnerability allows infiltrators to get access to your account with the help of your login phone number. But there is no need to worry because the good news is that after being alerted by Appsecure, Tinder has fixed the issue.

According to Appsecure, the hackers could have taken advantage of two vulnerabilities to attack accounts. One is Tinder's own API and the other is in Facebook's Account Kit system which Tinder uses to manage the logins
Basically, the vulnerability exposed the access tokens of the users. If a hacker is successful in obtaining the valid access token then he/she can easily take over a user account.

Anand Prakash from Appsecure explained how the attack works on Tinder, "The user clicks on Login with Phone Number on tinder.com and then they are redirected to Accountkit.com for login. If the authentication is successful then Account Kit passes the access token to Tinder for login."

"Interestingly, the Tinder API was not checking the client ID on the token provided by Account Kit.This enabled the attacker to use any other app's access token provided by Account Kit to take over the real Tinder accounts of other users," he added.

Appsecure has already received awards of $5,000 and $1,250 by Facebook and Twitter through the companies' bug bounty programs for reporting such security flaws.
  Share This News with Your Friends on Social Network  
  Comment on this Story  
 
 
 
Early Times Android App
STOCK UPDATE
  
BSE Sensex
NSE Nifty
 
CRICKET UPDATE
 
 
 
 
 
 
 
 
   
Home About Us Top Stories Local News National News Sports News Opinion Editorial ET Cetra Advertise with Us ET E-paper
 
 
J&K RELATED WEBSITES
J&K Govt. Official website
Jammu Kashmir Tourism
JKTDC
Mata Vaishnodevi Shrine Board
Shri Amarnath Ji Shrine Board
Shri Shiv Khori Shrine Board
UTILITY
Train Enquiry
IRCTC
Matavaishnodevi
BSNL
Jammu Kashmir Bank
State Bank of India
PUBLIC INTEREST
Passport Department
Income Tax Department
JK CAMPA
JK GAD
IT Education
Web Site Design Services
EDUCATION
Jammu University
Jammu University Results
JKBOSE
Kashmir University
IGNOU Jammu Center
SMVDU