Enterprenuers

Hive Social Subject to ‘Critical Vulnerabilities’

[ad_1]

Hive Social, the platform that touts its focus on the “simplicity of social media,” has temporarily turned off its servers following a discovery that user data is vulnerable to hackers.

The Berlin-based security collective Zerforschung found several “critical vulnerabilities” that it then reported to the company.

“The issues we reported allow any attacker to access all data, including private posts, private messages, shared media and even deleted direct messages,” the report read. “This also includes private email addresses and phone numbers entered during login.”

The security vulnerabilities are so severe that Zerforschung stated it would not be elaborating on the findings to protect those still using the app.

Hive Social has gained significant popularity over the past few months, particularly following Elon Musk’s Twitter takeover, and reached two million users last week.

Related: The Purge: Get Ready For Your Twitter Followers To Decrease

However, despite the rapid expansion, Hive is run by founder Raluca Pop and just two other employees — which could contribute to the platform’s acute vulnerability to security violations.

Following the post by Zerforschung, Hive turned off its servers to address the problem and create a “better and safer experience,” the company announced on Twitter.

Zerforschung reported that after various discussions with the social media platform, Hive claimed to have fixed the problem but Zerforschung quickly discovered that wasn’t the case. In response, Hive took to Twitter again to clarify that it never claimed the issues were fixed but that it was in the process of fixing them.

Related: 5 Ways to Keep Your Social Media Accounts Safe From Hackers



[ad_2]

Share this news on your Fb,Twitter and Whatsapp

File source

Times News Network:Latest News Headlines
Times News Network||Health||New York||USA News||Technology||World News

Tags
Show More

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
Close