In This Section

PINDROP BLOG

Category: Authentication

May 3, 2016
Researchers Find Serious Flaws in Samsung SmartThings Platform
Researchers at the University of Michigan have identified a set of vulnerabilities in Samsung’s SmartThings platform that allowed them to remotely unlock doors, set off smoke alarms, and perform other unwanted actions through the use of overprivileged apps. SmartThings is a platform designed to support the use of a variety of connected devices in a…
Read More →
May 2, 2016
Serious Flaw Allows Takeover of FreedomPop Mobile Phone Accounts
Attackers are always looking for new ways to get access to users’ bank accounts and mobile devices, but sometimes the old ways are best. A researcher has discovered a serious security flaw in mobile provider FreedomPop’s site that allow an attacker to take complete control of a victim’s mobile account. Paul Moore, a security researcher and consultant in…
Read More →
April 29, 2016
Researchers Find Private Slack Tokens Posted on GitHub
Developers building bots for Slack are including their personal access tokens in code posted on GitHub, researchers have found, a problem that could give anyone who finds the tokens access to internal Slack conversations and files. Slack is a team communications app used in many organizations to share information, files, and other data. Developers can…
Read More →
April 28, 2016
Office 365 Bug Could’ve Allowed Attackers to Login to Virtually Any Account
Security researchers in January discovered a critical vulnerability in the SAML implementation in Microsoft’s Office 365 service that could allow an attacker to log in to a victim’s account and gain full access to email, contacts, and other sensitive data. The vulnerability was present in Office 365 for an unknown amount of time, and there…
Read More →
April 27, 2016
Hear a Real Bank Phone Fraud Call From a Fake Cop
The ongoing problem of fraudsters targeting senior citizens with sophisticated phone scams has taken a new turn, as the criminals have begun using a technique that involves them showing up at victims’ homes to collect their debit cards. The scam is an extension of a common phone fraud technique in which criminals call victims–typically senior…
Read More →
April 26, 2016
Verizon DBIR Shows Focus on Credential Theft in Breaches
Attackers are continuing to refine their tactics and develop new tools, but in a lot of cases they still rely on tried-and-true methods such as phishing, social engineering, malware, keyloggers, and credential theft to achieve their goals. The 2016 Verizon Data Breach Incident Report shows that these tactics and tools are still among the most-used by…
Read More →
April 25, 2016
Massive Bank of Bangladesh Attack Hit SWIFT Payment System
Attackers who pulled off the massive bank fraud at the Bangladesh Bank in February did so by using custom malware and attack tools that were able to monitor the internal messages that conduct financial transactions, delete certain messages, and then insert others to send money to accounts they control, researchers say. The tools targeted the SWIFT…
Read More →
April 18, 2016
GitLab Fixes Authentication Bypass Flaw
GitLab has patched a serious authentication vulnerability that enabled any user to take over another user’s account with two-factor authentication enabled. The vulnerability was a result of the way that GitLab’s authentication flow produced one-time passwords for accounts with 2FA enabled. An attacker who knows a victim’s username and can capture network traffic could sign in…
Read More →
April 14, 2016
Bill Requiring Phone Crypto Backdoors Dies in California Assembly
A California bill that would require backdoors in phone encryption has died in the state assembly after failing to gain enough support to move out of committee. The bill, proposed in January, would have required that device manufacturers have the capability of decrypting and unlocking any phone sold in California after Jan. 1, 2017. A…
Read More →
April 14, 2016
Final Draft of Burr-Feinstein Bill Called ‘Dangerous’
The final version of a proposed bill that would require vendors to have a method for providing plaintext data to law enforcement agencies has been released, and privacy advocates and legislators are calling it “flawed” and “dangerous”. The Burr-Feinstein bill has been making the rounds of Capitol Hill in draft form since last week, and…
Read More →
Pindrop® Panorama: Beating the Balancing Act of Security and Customer Service