Apple ID accounts reportedly vulnerable to password reset hack, forgot password page taken offline for maintenance (update 2: back)

Apple ID accounts reportedly vulnerable to password reset hack, forgot password page taken offline for maintenance

Gaping security holes are a pretty terrifying thing, especially when they involve something as sensitive as your Apple ID. Sadly it seems that immediately after making the paranoid happy by instituting two-step authentication a pretty massive flaw in Cupertino’s system was discovered and first reported by The Verge. Turns out you can reset any Apple ID password with nothing more than a person’s email address and date of birth — two pieces of information that are pretty easy to come across.

There’s a little more to the hack, but it’s simple enough that even your non-tech savvy aunt or uncle could do it. After entering the target email address in the password reset form you can then select to answer security questions to validate your identity. The first task will be to enter a date of birth. If you enter that correctly then paste a particular URL into the address bar (which we will not be publishing for obvious reasons), press enter, then — voilà — instant password reset! Or, at least that’s the story. While we were attempting to verify these claims Apple took down the password reset page for “maintenance.” Though we’ve received no official confirmation from Apple, it seems the company is moving swiftly to shut down this particularly troublesome workaround before word of it spreads too far.

Update: We’ve heard back from Apple on the matter, which stated, “Apple takes customer privacy very seriously. We are aware of this issue, and working on a fix.” No real surprises that a fix is in the works, but there you have it from the horse’s mouth.

Update 2: The forgotten password page is back as of late Friday evening — that was (relatively) quick. iMore reports (and we’ve verified ourselves) that the security hole is now closed.

Filed under: ,

Comments

Source: The Verge, iMore

Galaxy Note II info ticker, pop-up browser and ICE menu combo reveal another lock screen flaw (video)

Galaxy Note II info ticker, pop-up browser and ICE menu combo make for another lock screen flaw (video)

The emergency contacts (ICE) menu is proving to be a Pandora’s Box of lock screen vulnerabilities on several Samsung Galaxy handsets. Users are finding ways to exploit this weak point and the latest flaw that’s come to our attention employs the pop-up browser on the Note II as an accomplice. It requires the information ticker to be active (found in lock screen settings) so news bites and such are displayed on the screen you encounter when waking the device. Touch upon something to find out more and you’re sent to the lock screen; from there, head to the ICE menu to find a pop-up browser window containing the item you chose in the ticker. Within that window, anyone can access the handset’s clipboard or point the browser to sites holding personal data. Sure, it isn’t as bad as the bug that completely disables the lock screen — identified on the Galaxy S III, but also found to work on the Note II — but is just another reason to hope the mythical box is almost empty and at the bottom lies a fix.

Filed under: , , ,

Comments

Source: Ganesh’s Blog

Galaxy S III bug disables lock screen, grants full access, tests patience (updated)

Galaxy S III bug disables lock screen, grants full access, tests patience

Lock screens are around for a reason: to keep people from getting where they shouldn’t. They aren’t always infallible, though, and a few weeks ago, we saw a vulnerability in several builds of iOS 6 that granted access to the phone module without a passcode. Then, a couple of days ago, we reported on a Galaxy Note II bug that allows the quick-fingered to launch anything immediately behind the lock screen. Now, a similar flaw has been found on the Galaxy S III that breaks the lock screen altogether, permitting full use of the phone. To replicate the bug, you’ll need to tap the “Emergency Call” button on the lock screen, then go into the ICE (emergency contacts) menu. From there, press the home button, followed quickly by the power button, and that’s it. If successful, pressing the power button again will bring up the home screen straight away, and what’s more, the lock screen won’t return until the handset is restarted. Sounds worryingly simple, right? In our experience, not so much.

We first tried this method on an S III running Android 4.0.4 ICS, and a Note II for good measure, but to no avail. Then, we had a crack at an S III running 4.1.2 Jelly Bean, and were close to giving up trying to replicate it when voilà, it worked. We hoped to provide you with a video of the bug, but it must be camera shy. Despite literally hundreds of attempts in front of the lens and several more behind it, we’ve only managed it once — we found it impossible to nail down the correct timing between the home and power button pushes. Samsung’s likely aware of the bug already and when quizzed about the Note II vulnerability, said a fix for lock screen issues on affected “Galaxy devices” was in the works (read: they didn’t say the Note II specifically). We’ve reached out for comment just to be sure, but until a patch is provided, keep your phone concealed from nosey types who read tech sites and have saint-like patience.

Update: Samsung has responded, confirming a fix is indeed on its way:

“Samsung considers user privacy and the security of user data its top priority. We are aware of this issue and will release a fix at the earliest possibility.”

Filed under: , , ,

Comments

Via: SlashGear

Source: Full Disclosure

BlackBerry Security Flaw Could Compromise Enterprise Servers

BlackBerry has released news which warns of a vulnerability that could expose enterprise servers to malware attacks. More »

iOS lock screen can be bypassed with some button mashing… again (video)

iPhone 5 review

It seems that every time Apple introduces a new version of iOS, it creates some new method to get past the software’s lock screen. A YouTube tutorial reveals the rather simple combination of button presses and fake emergency calls necessary to give you access to anyone’s iDevice — or more specifically to the iOS phone module, from where you can make calls or view and edit contacts. You’ll have to be quick-fingered, however, as you have to push the home button rapidly after getting into the iPhone’s contact list. You can learn how to do it after the break, but until Cupertino issues an update, we’d suggest keeping your beloved fondlephone close by.

Filed under:

Comments

Via: Gizmodo, S1riOS6 (Spanish)

Sony stops Xperia Tablet S sales due to gaps between display panel and case

Sony stops Xperia Tablet S sales due to gaps between display and case

When Sony’s designers put a port flap on the Xperia Tablet S in an effort to make it splash-proof, they surely didn’t count on their good intentions being undermined by leaky build quality in other areas. According to Reuters though, that’s exactly what has happened: a number of tablets have come off the production line with gaps between the screen and the chassis, and it must be a significant proportion because Sony has now decided to halt sales until it can get the problem fixed. The company is also promising to repair any of the 100,000 tablets that have already shipped, but doesn’t expect the issue to be serious enough to dampen its earnings (which, let’s face it, could already do with some time out in the sun).

Filed under: ,

Sony stops Xperia Tablet S sales due to gaps between display panel and case originally appeared on Engadget on Fri, 05 Oct 2012 05:31:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceReuters  | Email this | Comments

Dropbox Turns on 2-Step Verification for All Accounts: You Should Too

Losing the totality of your digital life can be a mind-boggling experience, which is one of the reasons that I immediately turned on 2-step verification when Google made it available for Google/Gmail accounts. Dropbox finally followed suit and I’m expecting others like PayPal and Amazon to follow as well.

dropbox 2 step verification

Why should you enable it? If you are using Dropbox to archive some files and your hard drive gets toasted, then it makes sense to protect them as much as possible. 2-step verification means that you add your mobile number to the site, and each time you log into your Dropbox with a new device, you’ll be sent a text message with a verification code that you’ll need to enter so that you can login.

dropbox 2 step verification enable

It’s a smart idea to enable this because it’s improbable that your accounts and your mobile phone will be compromised at the same time.

[via Dropbox]


Apple responds to iPhone text message spoofing, reminds us how secure iMessage is

If you’re a frequent texter, and the iPhone is your weapon of choice, there’s a good chance you’ve been a wee bit concerned since yesterday’s report that the device is vulnerable to a certain SMS spoofing attack. Basically, it’s possible for a malicious individual to send a message and specify a reply-to number that is not their own, appearing as if they are someone else. We got in touch with an Apple representative and here’s what we were told:

Apple takes security very seriously. When using iMessage instead of SMS, addresses are verified which protects against these kinds of spoofing attacks. One of the limitations of SMS is that it allows messages to be sent with spoofed addresses to any phone, so we urge customers to be extremely careful if they’re directed to an unknown website or address over SMS.

Even if you aren’t on an iPhone, we’d like to remind you to be careful when texting. There are numerous services out there that let you send a message that appears to be from anybody you like — regardless of what model, OS or even carrier the recipient is using. All the more reason to think twice before filing that loan application over SMS.

Apple responds to iPhone text message spoofing, reminds us how secure iMessage is originally appeared on Engadget on Sat, 18 Aug 2012 11:58:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments

iPhone reportedly vulnerable to text message spoofing flaw

iPhone reportedly vulnerable to text message spoofing flaw

If you’re an iPhone owner, you may want to use good judgment before responding to any out-of-the-blue text messages in the near future. French jailbreak developer and security researcher pod2g finds that every iPhone firmware revision, even iOS 6 beta 4, is susceptible to a flaw that theoretically lets a ne’er-do-well spoof the reply address of outbound SMS messages. As Apple is using the reply-to address of a message’s User Data Header to identify the origin rather than the raw source, receiving iPhone owners risk being fooled by a phishing attack (or just a dishonest acquaintance) that poses as a contact or a company. A proof of concept messaging tool is coming to the iPhone soon, but pod2g is pushing for an official solution before the next iOS version is out the door. We’ve asked Apple for commentary and will get back if there’s an update. In the meantime, we wouldn’t panic — if the trickery hasn’t been a significant issue since 2007, there isn’t likely to be a sudden outbreak today.

Filed under:

iPhone reportedly vulnerable to text message spoofing flaw originally appeared on Engadget on Fri, 17 Aug 2012 12:53:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourcepod2g  | Email this | Comments