The Snappening is happening and 13GB of Snapchat pictures have now been leaked on-line. The images appear to have been skimmed from the aligned, 3rd party website although investigations and denials are still being batted back and forth.

Snapchat themselves have flatly denied that any leak of images could have come from them - Snapchat has been designed on the premise that any images sent are transient and unlike previous vulnerabilities reported in Snapchat this time Snapchat are absolving themselves of any blame. Attention has then turned to aligned 3rd party apps such as Snapsave which allows users to save Snapchat originated images, although again, the makers of the Snapsave app have also denied any blame for the leaked photos.

It all serves to provide another damaging blow to the credibility of any 3rd party personally identifiable information and in the public eye, just as with the recent Apple iCloud photo theft, the association will be made that 3rd parties cannot be trusted to safeguard our data.

In the case of the iCloud breach, Apple also denied any culpability, suggesting instead that this was a more straightforward hijacking of user credentials. In other words, the Apple explanation is that usernames and passwords were either guessed, brute forced, or another source of stolen username and password combinations was simply applied to iCloud. Given that most users still use simple passwords and/or the same username and password for all websites this is a credible theory.

Perhaps the main takeaway from The Snappening is that a good password policy needs to become second nature for all of us, not just when imposed as part of a governance, regulatory or compliance initiative policy.


The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2023, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.