secret account credentials

A Google spokesman said the company's Android toms shoes for sale team is aware of the Picasa deficiencies and is working on a fix.Researchers Bastian Könings, Jens Nickels, and Florian Schaub warned that the weaknesses could be used against people who use their Android devices on networks under the control of an attacker. We wanted to know if it is really possible to launch an impersonation attack against Google services and started our own analysis,” the researchers in the university's Institute of Media Informatics wrote on Friday. “The short answer is: Yes, it is possible, and it is quite easy to do so.”The findings build off previous findings of Rice University professor Dan Wallach, who in February uncovered similar Android privacy shortcomings affecting Twitter, Facebook, and Google Calendar during a simple exercise for his undergraduate security class. The attacks can only be carried out when the devices are using unsecured networks, such as those offered at Wi-Fi hotspots. Google patched the security hole earlier this month with the release of Android 2.3.4, although that version, and possibly Android 3, still cause devices synchronizing with Picasa web albums to transmit sensitive data through unencrypted channels, the researchers said. Based on Google's own statistics, this means more than 99 percent of Android-based handsets are vulnerable to the attacks, which are similar in difficulty and effect to so-called sidejacking exploits that steal authentication cookies. The vast majority of devices running Google's Android operating system are vulnerable to attacks that allow adversaries to steal the digital credentials used to access calendars, contacts, and other sensitive data stored on the search giant's servers, university researchers have warned. The weakness stems from the improper implementation of an authentication protocol known as ClientLogin in Android versions 2.3.3 and earlier, the researchers from Germany's University of Ulm said. After a shop online 2011 user submits valid credentials for Google Calendar, Contacts and possibly other accounts, the programming interface retrieves an authentication token that is sent in cleartext. Because the authToken can be used for up to 14 days in any subsequent requests on the service, attackers can exploit them to gain unauthorized access to accounts.
Par online le jeudi 19 mai 2011

Commentaires

Il n'y a aucun commentaire sur cet article.

Recherche sur NoxBlog

Connexion à NoxBlog.com

Nom d'utilisateur
Mot de passe
Toujours connecté
 

Inscription sur NoxBlog


Adresse du blog
.noxblog.com

Mot de passe

Confirmation

Adresse email valide

Code de sécurité anti-spam

Code anti-bot

J'accepte les conditions d'utilisation de NoxBlog.com