{"id":205645,"date":"2016-04-10T13:28:27","date_gmt":"2016-04-10T13:28:27","guid":{"rendered":"http:\/\/4cd.e16.myftpupload.com\/?p=205645"},"modified":"2016-04-10T13:28:27","modified_gmt":"2016-04-10T13:28:27","slug":"flaw-in-truecaller-android-app-exposes-millions-to-hacks","status":"publish","type":"post","link":"https:\/\/citifmonline.com\/2016\/04\/flaw-in-truecaller-android-app-exposes-millions-to-hacks\/","title":{"rendered":"Flaw in Truecaller Android app exposes millions to hacks"},"content":{"rendered":"

This vulnerability, which has been fixed in the latest Android update, could have allowed anyone to potentially gain access to Truecaller users\u2019 information and change their call blocking settings. The millions of Android users who downloaded this app on their smartphones could be in danger.<\/p>\n

The CM Security Research Lab recommends that Truecaller Android users update to the latest version on Google Play immediately.<\/p>\n

The researcher found that Truecaller uses devices\u2019 IMEI as the only identity label of its users. Meaning that anyone gaining the IMEI of a device will be able to get Truecaller users\u2019 personal information (including phone number, home address, mail box, gender, etc.) and tamper app settings without users\u2019 consent, exposing them to malicious phishers.<\/p>\n

\"\"<\/p>\n

By exploiting this flaw, the attackers can:<\/p>\n