Feeds

#YO_NO! Messaging app 'Yo' gets hit by hackers

Well, at least someone found a use for the thing...

Internet Security Threat Report 2014

Just days after the Yo app debuted to much fanfare (and head-scratching), the mono-message social tool has fallen prey to hackers.

A group of students from Georgia Tech University claim via TechCrunch to have accessed the application's entire user database, and gained the ability to obtain the phone number of anyone currently using the one-word messaging platform.

Yo hacked

Yo! D'oh!

Additionally, the students said they had the ability to send any individual user or any group of users custom text messages via the service. They also say they can send push notifications and spoof Yo messages.

Shortly after the report emerged, users on Twitter began spreading messages of the proof-of-concept examples. The company has not confirmed the specific details of the TechCrunch report, but did say that it was working to address an unspecified security problem.

The hack comes after Yo was thrust into the public light when it was revealed that the one-word messaging app, despite being of questionable value and usefulness, had received $1m in funding from the venture capital community.

This latest incident could leave some investors questioning their decision. Then again, given the amount of buzz the app has generated in the past week, Yo's backers may not mind at all... ®

Security for virtualized datacentres

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.