PBS hacked by LulzSec: Lulz Boat Sailed, PBS Failed.It is suspected that between 30,000 and 120,000 users were affected by DroidDreamLight. Malware in the tainted apps can be activated by an incoming call, meaning users do not actually have to launch the app to trigger it.Īnyone who downloaded an app on Lookout's list could have their personal information compromised. The new malware is being called “Droid Dream Light” (DDLight). The smartphone security firm said the infected apps are a "stripped down version of DroidDream" and were probably maliciously crafted by the same developers. While we are on the subject of Androids and apps, Lookout Mobile Security reported finding 26 malware-laced applications in the official Android Market. He noted if you want to hijack more than three profiles with FaceNiff, there will be an option to pay and unlock the code. However, FaceNiff app developer Bartosz Ponurkiewicz says more sites for hopping onto user accounts will soon be supported. Not that you intend to try out FaceNiff, but you can't hijack more than three profiles. Unlike Firesheep, the FaceNiff app listens in on wireless networks encrypted with WPA and WPA2 (WEP too) so that with one tap and within seconds, users can hijack the account types supported. FaceNiff allows users to sniff and intercept web sessions for Facebook, Twitter, YouTube, Amazon, and Nasza-Klasa (a Polish site).
The hacking app requires root access on Android phones. Like a wicked mobile cousin of Firesheep, FaceNiff could allow even a clueless noob to hack Facebook over Wi-FI networks. Picture this mobile-type scenario, as a person with a rooted Android smartphone casually strolls by a Starbucks, he or she taps once on a new app, and whammo, hops on and takes over Facebook profiles.
FACENIFF IPHONE APP PORTABLE
Stealing cookies to potentially steal users' credentials just got so easy and portable that loony stalkers are probably jumping for joy.