Categories: Technology

How A Viber Conversation leak out

Viber can be hack easily. Along With Mobile and Telephone the Viber, Tango and Whatsapp like Messaging and calling App is under Government Surveillance. Recently, A Viber conversation of Politician Mahmudur Rahman Manna and Sadek Hossain audio tape has leaked in YouTube.

Last month Government had blocked these apps for several days. The authority accused these apps are used by the criminals and it need to monitor.

The experts believe that, Bangladesh Government has the capacity and technology to record viber conversation. It can be done by IP tracking and with the help of IIG.

Earlier, Wiki leaks published information about A software that Bangladesh bought from European firms and it is called Fin spy. Fin spy can track all conversation, video text and image. Fin spy can take control of smartphone, computer and can tap call. It can take all information and break privacy.

Your Apps Are Watching You

A WSJ Investigation finds that iPhone and Android apps are breaching the privacy of smartphone users. Few devices know more personal details about people than the smartphones in their pockets: phone numbers, current location, often the owner`s real name—even a unique ID number that can never be changed or turned off. These phones don`t keep secrets. They are sharing this personal data widely and regularly, a Wall Street Journal investigation has found.

A vlog post raises a few questions on Viber Technology

People might think that Israeli Viber was made to allow people to make free calls but , in fact this voice-over-IP phone application is more dangerous than that .

Why we think Israeli Viber is spying on you!?

Viber was founded by Israelis, more over the same people who found IMesh , according to agmon.com, IMesh which started as a music sharing application , ended up by installing spywares on the computers of the users who install it .

Privacy , according to their privacy statement “A copy of your address book will be stored on our servers and will be used to…” more over the calls that you make on Viber are being logged and recorded on those server , and yes they may share your personal data with 3rd parties they “trust”!.

Viber are trying to hide their identity, but a Google Search will help you make sure of all the information mentioned in this article .

Do you know who founded Israeli VIBER!???

Well his name is Talmon Marco! Talmon served for four years in the Israel Defense Forces and held the position of CIO of the central command. He graduated Cum Laude from the Tel-Aviv University with a degree in Computer Science and Management.

SO, WILL YOU GIVE AWAY ALL YOUR CONTACT LISTS AND CALL LOGS TO GUYS WHO MADE MONEY FROM SPYWARE DISTRIBUTION?

This article is not meant to be against any nationality, the big issue is that Viber Team are continuously doing their best to hide their identity , but why ?

To note that , this application by default will have access to your messaging inbox gps location, your phone and all of the data saved on the mobile .

Sum up : Viber is an Israeli spying application, which clearly has 2 goals , the first is to gather data and sell it , and the second is to send this data to the Israeli government so they use this information against you .

Let`s Find What McAfee said on their latest Report

Cellphones with mobile apps could be potential target of cyber attacks globally and subscribers` data including usernames and passwords are at risk, security software maker McAfee said in their latest Report.

The failure of mobile application developers to patch critical secure sockets layer (SSL) vulnerabilities could potentially impact millions of mobile phone users, according to McAfee Labs Threats Report: February 2015.

It said that in September 2014, Computer Emergency Response Team (CERT) at Carnegie Mellon University released a list of vulnerable mobile applications and McAfee Labs in January tested the 25 most popular apps on the list.

During the tests, it was found that 18 have still not been patched despite public disclosure, vendor notification, and, in some cases, multiple version updates addressing concerns other than security.

The report said most downloaded vulnerable app in this group is a mobile photo editor with between 100 million and 500 million downloads. The app allows users to share photos on several social networks and cloud services.

“McAfee Labs researchers simulated man-in-the-middle (MITM) attacks that successfully intercepted information shared during supposedly secure SSL sessions. The vulnerable data included usernames and passwords and in some instances, login credentials from social networks and other third party services,” it said.

In cryptography and computer security, the man-in-the-middle attack (often abbreviated to MITM, MitM, MIM, MiM or MITMA) requires an attacker to have the ability to both monitor and alter or inject messages into a communication channel. One example is active eavesdropping, in which the attacker makes independent connections with the victims and relays messages between them to make them believe they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.

Although there is no evidence that these mobile apps have been exploited, the cumulative number of downloads for these apps ranges into the hundreds of millions, the report said.

“Given these numbers, McAfee Labs findings suggest that the choice by mobile app developers to not patch the SSL vulnerabilities has potentially put millions of users at risk of becoming targets of MITM attacks,” it added.

McAfee Labs also warned of increasingly aggressive potentially unwanted programs (PUPs) that change system settings and gather personal information without the knowledge of users.

McAfee Labs reported that mobile malware samples grew 14 per cent during the fourth quarter of 2014, with Asia and Africa registering the highest infection rates.

Tech and Teen

Recent Posts

Mohammad Shahjalal elected as the Chairman of eGeneration PLC

Mohammad Shahjalal has been unanimously elected as the Chairman of eGeneration PLC in the Board…

3 weeks ago

GIGABYTE Announces AORUS Z890 Motherboards Now Available, Unlocking AI-Enhanced Performance with D5 Bionic Corsa

GIGABYTE, the world’s leading computer brand, proudly announces that the AORUS Z890 series motherboards are…

3 weeks ago

PriyoShop recognised as a Semi-finalist in Supernova Challenge 2024

The Supernova Challenge is the biggest pitch competition based in Dubai, cohorting the Middle East,…

3 weeks ago

University of Information Technology and Sciences (UITS) Submits Application of ‘Intent to Apply’ for BAC Accreditation

The University of Information Technology and Sciences (UITS) Institutional Quality Assurance Cell (IQAC) submitted applications…

3 weeks ago

Banglalink Introduces Exciting Value Back Offers on iPhone 16 Series

Banglalink, the country’s innovative digital operator, is here with exclusive offers on the newest iPhone…

3 weeks ago

Kaspersky uncovers new Grandoreiro light variant

Despite the arrest of important operators in early 2024, Grandoreiro continues to be used by…

3 weeks ago