Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 28 May, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Verizon fix flaw in Android app

by The Gurus
January 21, 2015
in Editor's News
Share on FacebookShare on Twitter

Verizon has confirmed that it has fixed a vulnerability in its My FiOS app, to enable users’ ability to securely access their Verizon email via the app.
 
In a story published by Forbes, it revealed that there was a vulnerability in Verizon’s My FiOS Android app that could be exploited to gain access to other customers’ emails with little effort.
 
The bug was uncovered by Randy Westergren, senior software developer with XDA-Developers, who said the flaw would have allowed an attacker to take control of any Verizon customers’ email account to view and send messages. He found the flaw whilst checking interactions between the app and the Verizon server responsible for handling My FiOS accounts.
 
Westergren was shocked to discover that he could simply switch out his own user ID – RWESTERGREN05 – with the user name of another account to reveal the latter’s email. By tinkering with other email-related parameters, the researcher could read and send email on behalf of other users.
 
In a statement sent to IT Security Guru, Verizon acknowledged that Westergren tipped the company on 14th January 14, it investigated it and corrected the issue in less than 36 hours. It said: “We appreciate the constructive and collaborative approach that he chose to resolve a security challenge. Working together, as we did, benefits everyone.”
 
It also said that the flaw was limited to the Android version of the My FiOS app and was experienced by a small subset of users – those who use it to access their email, which few of them do.  Beginning last night, users of the Android version receive an automatic corrective update pushed to their device when they use the app
 
However Verizon dismissed claims that its emails are not secured using SSL, saying that Verizon email is secured in transit using SSL/TLS encryption. “If you go to the Verizon Webmail sign-in page, you’ll see the HTTPS marker in its URL,” it said.
 
Trey For
d, global security strategist at Rapid7, said: “This is a great example of how the general curiosity of the public makes the internet safer for all users. It demonstrates the value of coordinated disclosure and open vulnerability acceptance by companies.

 
“Thankfully, the researcher felt safe in reporting his finding to Verizon. The research community is often intimidated away from reporting vulnerabilities to companies due to confusing laws and corporate lawyers responding unfavourably to any external entity finding flaws that could affect the company’s public image.
 
“Randy Westergren (per his blog) believes in disclosure, and apparently did a solid job communicating his finding, and provided a proof of concept exploit, which effectively communicated and demonstrated the risk exposed by the vulnerable API. Kudos to Randy and Verizon for a textbook example of coordinated disclosure, and acting in the best interest of customers.”

FacebookTweetLinkedIn
Tags: Androidmobile
ShareTweet
Previous Post

1,800 Minecraft user credentials posted online

Next Post

To stay safe from cyber crime small firms need to stop thinking like consumers

Recent News

SnapDragon Monitoring scam advice

Tips to Protect Against Holiday and Airline Scams

May 25, 2023
Access Segmentation & Encryption Management from MyCena

New security model launched to eliminate 95% of cyber breaches

May 25, 2023
KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

May 25, 2023
Purple Logo, capitalised letters: SALT.

Salt Security Uncovers API Security Flaws in Expo Framework, Issues have been Remediated

May 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information