<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Aaj TV English News - News</title>
    <link>https://english.aaj.tv/</link>
    <description>Aaj TV English</description>
    <language>en-Us</language>
    <copyright>Copyright 2026</copyright>
    <pubDate>Sun, 12 Apr 2026 18:51:55 +0500</pubDate>
    <lastBuildDate>Sun, 12 Apr 2026 18:51:55 +0500</lastBuildDate>
    <ttl>60</ttl>
    <item xmlns:default="http://purl.org/rss/1.0/modules/content/">
      <title>Some popular iPhone apps might be secretly leaking your information</title>
      <link>https://english.aaj.tv/news/10372207/some-popular-iphone-apps-might-be-secretly-leaking-your-information</link>
      <description>&lt;caption id="attachment_371302" align="alignnone" width="800"&gt;&lt;a href="https://i.aaj.tv/wp-content/uploads/2017/01/iphone.jpg"&gt;&lt;img class="size-full wp-image-371302" src="https://i.aaj.tv/wp-content/uploads/2017/01/iphone.jpg" alt=".â€” File photo" width="800" height="480" /&gt;&lt;/a&gt; .â€” File photo&lt;/caption&gt;
&lt;p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="10"&gt;&lt;strong&gt;Appleâ€™s iPhone is more secure than its rivals, but that doesnâ€™t mean that apps or the device itself canâ€™t be hacked. A security researcher discovered a flaw in some 76 App Store apps with more than 18 million downloads between them that would allow a malicious individual to capture certain data from the iPhone. &lt;/strong&gt;&lt;/p&gt;
&lt;p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="10"&gt;The security issue canâ€™t be fixed by Apple directly. Instead, each developer should handle with extra care network-related code that might interfere with Appleâ€™s default practices for transporting data over a secured connection.&lt;/p&gt;
&lt;p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="10"&gt;Will Strafach used his verify.ly service to discover 76 applications that can be leak data about yourself. The security exploit takes advantage of a data transfer protocol that might be misconfigured in certain apps.&lt;/p&gt;
&lt;p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="15"&gt;A security feature introduced by Apple in iOS 9 called App Transport Security feature is meant to force app data transfers over secured HTTPS. But misconfigured network code in an iOS app can fool the ATS protocol to see a connection as TLS-protected (HTTPS) even when itâ€™s not. A hacker with knowledge of the issue would be able to siphon off data from an iPhone over a Wi-Fi connection.&lt;/p&gt;
&lt;p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="16"&gt;Strafach divided the 76 apps into three categories, including low-risk (33 apps), medium-risk (24 apps), and high-risk (19 apps).&lt;/p&gt;
&lt;p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="17"&gt;A high-risk app would leak financial or medical service login credentials and session authentication tokens for logged users. A medium-risk app would let the hacker intercept login credentials and session authentication tokens for logged in users.&lt;/p&gt;
&lt;p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="18"&gt;Low-risk apps would leak partially sensitive data about the device, including email address and login credentials.&lt;/p&gt;
&lt;p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="19"&gt;The researcher posted the 33 low-risk apps he discovered complete with information on what kind of information hackers can steal. For example, Snap Upload for Snapchat would give a hacker the username and password to Snapchat â€” check out the full list at this link.&lt;/p&gt;
&lt;p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="20"&gt;Strafach did not share the medium- and high-risk apps and chose to reach out to affected â€œbanks, medical providers, and other developers of sensitive applications which are vulnerable,â€ before identifying them. He will post more information about them in 60 to 90 days.&lt;/p&gt;
&lt;p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="21"&gt;The same problem affected Experian in 2016 and PayPal in 2010.&lt;/p&gt;
&lt;p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="22"&gt;The attacks, however, arenâ€™t exactly simple, and they require knowledge of the issue, specialized equipment, and proximity to a target who must have installed on his or her device vulnerable apps.&lt;/p&gt;
&lt;p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="23"&gt;What you can do until then is to avoid connecting to any untrusted Wi-Fi network for any sensitive data exchanges, such as internet banking sessions. Choose cellular data instead, which would make it nearly impossible for a hacker to intercept the same data. Of course, if hackers are targeting you for any reason, then you might have some bigger problems to deal with than worrying about what Wi-Fi network to trust when youâ€™re not at home.&lt;/p&gt;
&lt;p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="23"&gt;&lt;strong&gt;This article was originally published at&lt;/strong&gt;&lt;a href="http://bgr.com/"&gt; &lt;em&gt;&lt;strong&gt;BGR&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;
</description>
      <content:encoded xmlns="http://purl.org/rss/1.0/modules/content/"><![CDATA[<caption id="attachment_371302" align="alignnone" width="800"><a href="https://i.aaj.tv/wp-content/uploads/2017/01/iphone.jpg"><img class="size-full wp-image-371302" src="https://i.aaj.tv/wp-content/uploads/2017/01/iphone.jpg" alt=".â€” File photo" width="800" height="480" /></a> .â€” File photo</caption>
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="10"><strong>Appleâ€™s iPhone is more secure than its rivals, but that doesnâ€™t mean that apps or the device itself canâ€™t be hacked. A security researcher discovered a flaw in some 76 App Store apps with more than 18 million downloads between them that would allow a malicious individual to capture certain data from the iPhone. </strong></p>
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="10">The security issue canâ€™t be fixed by Apple directly. Instead, each developer should handle with extra care network-related code that might interfere with Appleâ€™s default practices for transporting data over a secured connection.</p>
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="10">Will Strafach used his verify.ly service to discover 76 applications that can be leak data about yourself. The security exploit takes advantage of a data transfer protocol that might be misconfigured in certain apps.</p>
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="15">A security feature introduced by Apple in iOS 9 called App Transport Security feature is meant to force app data transfers over secured HTTPS. But misconfigured network code in an iOS app can fool the ATS protocol to see a connection as TLS-protected (HTTPS) even when itâ€™s not. A hacker with knowledge of the issue would be able to siphon off data from an iPhone over a Wi-Fi connection.</p>
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="16">Strafach divided the 76 apps into three categories, including low-risk (33 apps), medium-risk (24 apps), and high-risk (19 apps).</p>
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="17">A high-risk app would leak financial or medical service login credentials and session authentication tokens for logged users. A medium-risk app would let the hacker intercept login credentials and session authentication tokens for logged in users.</p>
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="18">Low-risk apps would leak partially sensitive data about the device, including email address and login credentials.</p>
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="19">The researcher posted the 33 low-risk apps he discovered complete with information on what kind of information hackers can steal. For example, Snap Upload for Snapchat would give a hacker the username and password to Snapchat â€” check out the full list at this link.</p>
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="20">Strafach did not share the medium- and high-risk apps and chose to reach out to affected â€œbanks, medical providers, and other developers of sensitive applications which are vulnerable,â€ before identifying them. He will post more information about them in 60 to 90 days.</p>
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="21">The same problem affected Experian in 2016 and PayPal in 2010.</p>
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="22">The attacks, however, arenâ€™t exactly simple, and they require knowledge of the issue, specialized equipment, and proximity to a target who must have installed on his or her device vulnerable apps.</p>
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="23">What you can do until then is to avoid connecting to any untrusted Wi-Fi network for any sensitive data exchanges, such as internet banking sessions. Choose cellular data instead, which would make it nearly impossible for a hacker to intercept the same data. Of course, if hackers are targeting you for any reason, then you might have some bigger problems to deal with than worrying about what Wi-Fi network to trust when youâ€™re not at home.</p>
<p class="canvas-atom canvas-text Mb(1.0em) Mb(0)--sm Mt(0.8em)--sm" data-type="text" data-reactid="23"><strong>This article was originally published at</strong><a href="http://bgr.com/"> <em><strong>BGR</strong></em></a></p>
]]></content:encoded>
      <category/>
      <guid>https://english.aaj.tv/news/10372207</guid>
      <pubDate>Wed, 08 Feb 2017 16:29:45 +0500</pubDate>
      <author>none@none.com (Asim Malik)</author>
    </item>
  </channel>
</rss>
