Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 29 January, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Trio of Flaws Found in Amazon's Fire Phone by MWR Researcher

by The Gurus
June 30, 2015
in News, Top 10 Stories
Share on FacebookShare on Twitter

Bernard Wagner, a researcher at MWR Labs, has reported flaws in the Fire phone that could allows apps to install certificates without interaction with users.
The CertInstaller tool facilitates the installation of certificates in apps. But the flaws discovered by Wagner mean that apps which don’t use certificate pinning are vulnerable to traffic interception. This in turn could lead to man-in-the-middle attacks. This kind of attack is used by attackers to secretly relay and possibly alter communications between two unknowing parties, who believe they are talking directly between themselves.
A third flaw discovered by Wagner relates to the ADB debugging feature of the operating system. ADB is a tool that allows users to perform actions that assist in development or debugging, allowing users to access various functions and data within the device. The phone is reported to not enforce secure debugging, meaning attackers could install or uninstall apps, bypass the lock screen and steal data, among other things.
Fire phone users should update their software, as the flaws are being addressed.
http://www.theregister.co.uk/2015/06/30/amazon_douses_fire_phone_maninthemiddle_diddle/
MWR have also published the details of these findings in two whitepapers:
https://labs.mwrinfosecurity.com/system/assets/994/original/mwri_fire_phone_uid_silent_cert_install.pdf
https://labs.mwrinfosecurity.com/system/assets/991/original/mwri_amazon_fire_no_secure_usb_debugging.pdf

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

OPM Background Check App Taken Offline for Security Fix

Next Post

MERS-Themed Spear Phishing Targets Japanese Media Company

Recent News

Data Privacy Day: Securing your data with a password manager

Data Privacy Day: Securing your data with a password manager

January 27, 2023
#MIWIC2022: Carole Embling, Metro Bank

#MIWIC2022: Carole Embling, Metro Bank

January 26, 2023
Lupovis eliminates false positive security alerts for security analysts and MSSPs

Lupovis eliminates false positive security alerts for security analysts and MSSPs

January 26, 2023
Threat actors launch one malicious attack every minute

Threat actors launch one malicious attack every minute

January 25, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information