CBS 5 exposed a “gaping hole” in the code of California’s state-run employment website that allows anyone who views the site to access and modify other users’ resumes and personal info simply by changing some numbers in the URL.
Kate Hanni, the founder of the passenger advocacy group FlyersRights.org, has filed a lawsuit against Delta Airlines in which she claims they hacked her email account and acquired personal email messages sent between her, some journalists, and a guy who was at the time working for Metron, a company hired by the FAA to investigate Delta.
Hey, we helped get an Ameriprise customer banned from the financial company’s consumer advisory panel! Sorry about that, Brendan.
That Sears website exploit we posted about a couple of weeks ago was funny, mainly because it seemed more embarrassing for Sears than a true security risk. However, an independent security researcher had also discovered a more significant issue with the site—it allowed for an unlimited number of gift card verification attempts via an external script, so a criminal could use the site as a brute force method to identify valid gift cards for Sears and Kmart.
[Note: The original headline for this post mistakenly identified Ameritrade as the subject of the post. It is actually Ameriprise Financial. I deeply regret the error.] Since March of this year, security expert Russ McRee of HolisticInfoSec.org has sent 6 messages to Ameriprise Financial warning them of easily exploitable security holes on their website. They ignored every request, while at the same time reassuring customers that “No one without the proper web browser configuration can view or modify information contained on our systems.”
For as long as there have been iPhones, there’s been the requirement to sign up for AT&T service. And as long as that requirement has been around, there have been hackers who release downloads that unlock your phones and free them to access other services.
[it] would have the right to claim statutory damages of up to $2,500 “per act of circumvention.” People who jailbreak phones, might even be subject to criminal penalties of as long as five years, if they circumvented copyright for a financial gain.
Christopher Soghoian over at Cnet is reporting that Turkish police may have used violence to get the encryption keys of one of primary ringleaders in the TJ Maxx credit card theft investigation. The suspect, Maksym Yastremskiy, is apparently a “major figure in the international sale of stolen credit card information.”
The ease with which a student was able to reset Sarah Palin’s Yahoo email password highlights a vulnerability of so-called “challenge questions” designed to verify your identity: if the questions are about personal details from your life, there’s a risk that somewhere out there on the web, that info is visible to the public. That might be a realistic risk only for public figures, but it’s also possible that friends or family members could answer your questions with a little guesswork. If you want better security, make up fake answers that you’ll remember.
Gmail recently rolled out a change to its settings, where now you can permanently turn on SSL encryption. Do it now—your personal data will thank you for it. Besides, it’s going to get a lot easier to hack Gmail sessions very soon, because some guy is planning on releasing a hacking tool to the public in order to force Google to implement better security. [monkey_bites]
Wired has been covering the ongoing investigation into recurring ATM pin thefts from Citibank accounts, and their latest article tracks how Ukrainian immigrants, a ringleader back in Russia, a hacked company named Fiserv that runs Citibank-branded ATMs in 7-Elevens, and an online payment service that also offers money laundering for a small fee all come together to steal your money. It’s an amazing look at how the U.S. tries to combat the threat of ATM-related theft.
Here’s a technique we’ll not be adding to our list of fun ways to escalate your complaint: The 18-year-old who recently hacked Comcast and took down the company’s homepage and webmail told Wired that it was Comcast’s own fault… The hacker, known as EBK, called Comcast to let them know they’d been hacked. The manager scoffed and hung up:
Whatever you do, don’t download any fun 3rd party programs to the iPhones at the University Avenue Apple store in Palo Alto, California. You may be detained for 2 1/2 hours, then photographed and told that other Apple stores will be ” on the lookout” for you.
Okay, who decided it would be funny to hack Comcast? DSLReports says, “Though there’s no indication that user privacy is jeopardized, you may want to avoid using Comcast webmail until things have been completely cleared up. [DSLReports]
Redbox rents DVD movies via vending machine in drugstores and supermarkets throughout the country, and on Friday they announced that they’d found credit card skimmers attached to three of their kiosks. What’s surprising is that they ‘fessed up so quickly, and in a highly public manner—they’ve got the text “SECURITY ALERT” at the top and bottom of their website, and the email they sent to their members is detailed, forthright, and helpful, and reposted in its entirety—along with photos of sample card skimmers—on their site. Attempts at identity theft no longer surprise us, but a competent handling of the issue by a company is pretty amazing.