Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Saturday April 21 2018, @10:07PM   Printer-friendly
from the trial-by-fire dept.

From Ars Technica:

A mobile application built by a third party for the RSA security conference in San Francisco this week was found to have a few security issues of its own—including hard-coded security keys and passwords that allowed a researcher to extract the conference's attendee list. The conference organizers acknowledged the vulnerability on Twitter, but they say that only the first and last names of 114 attendees were exposed.

The vulnerability was discovered (at least publicly) by a security engineer who tweeted discoveries during an examination of the RSA conference mobile app, which was developed by Eventbase Technology. Within four hours of the disclosure, Eventbase had fixed the data leak—an API call that allowed anyone to download data with attendee information.

[...] This is the second time an RSA mobile application has leaked attendee data. In 2014, an application built by another developer, QuickMobile, was found by Gunter Ollmann (who was that time at IOactive) to have a SQLite database containing personal information on registered attendees.

Also at ITWire.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by MichaelDavidCrawford on Saturday April 21 2018, @10:13PM

    by MichaelDavidCrawford (2339) Subscriber Badge <mdcrawford@gmail.com> on Saturday April 21 2018, @10:13PM (#670179) Homepage Journal

    During the dot-com boom. Can I find a screenshot?

    Bing's image search really _is_ better than googles but even so, images.bing.com yields no insight.

    On the homepage there was a photo of two young men holding their index finger and thumb in an "L" shape, pressed against their foreheads. Bonita explained that that gesture was meant to convey the message that the two guys were "losers".

    They actually hacked RSA's nameservers. Perhaps the RSA webmaster did a good job of locking down their website.

    I understand that each of the root nameservers runs a different operating system with a variety of instruction set architectures. If one is going to take down the entire internet one would need need to zero-day the nameservers in a whole bunch of different ways.

    --
    Yes I Have No Bananas. [gofundme.com]
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2