由买买提看人间百态

boards

本页内容为未名空间相应帖子的节选和存档,一周内的贴子最多显示50字,超过一周显示500字 访问原贴
Programming版 - 狗狗也leak user information
相关主题
Open Position - Research Scientist at McAfee Inc. (转载)Today tried bleeding localhost
python一问macOS/Linux 巨大安全漏洞 shellshock (转载)
这样会不会造成memory leak?这哥们是超级Python黑
请教各位有谁用过国内的手机App外包公司?面试碰到J2EE系统安全性的问题应该怎么回答?
这个IP在哪里Linux vulnerability "GHOST"
whois mitbbs.com请教这段Code到底是哪错了?
JDK 7u11 released with two vulnerability fixes (转载)葵花宝典之四大神功
Apple's anti-malware blacklists Java 7 plug-in againWindows GUI developer vs Linux System Defect Analyzer,选哪 (转载)
相关话题的讨论汇总
话题: google话题: apps话题: cisco话题: whois
进入Programming版参与讨论
1 (共1页)
w**z
发帖数: 8232
1
Google accidentally leaked hundreds of thousands of customers' personal
details and didn't notice for 2 years
Read more: http://www.businessinsider.com/google-leaks-whois-data-of-280000-customers-2015-3#ixzz3UlD54a5k
Google accidentally leaked the personal details of more than 280,000
customers, Ars Technica reports. The fault first appeared back in mid-2013,
but it has only recently been discovered and fixed, meaning people have been
at risk for years.
Identified by security researchers at Cisco, the vulnerability affects
websites registered via Google Apps for work, using the registrar eNom. The
owners of the websites in question had all opted into "WHOIS privacy
protection." When someone "WHOIS's" — or queries — the website, the
personal details of the person who registered it are hidden.
You might use the service if you're, say, an anonymous blogger or run a
website about an embarrassing hobby — or are just privacy-conscious.
In fact, 305,925 domains were registered this way, but Cisco found that 282,
867 of them (94%) have had their personal details unmasked because of a
fault in Google's code. Customers' leaked information includes "full names,
addresses, phone numbers, and email addresses."
Cisco discovered the issue on February 19, 2015, two years after the fault
first arose. After Google was notified, the search giant fixed it about a
week later, and notified customers on March 17, 2015. It's unclear how many
customers seeking anonymity were unmasked as a result of this error.
Cisco researchers write that, in addition to the direct threat that the
operators of sensitive websites may face as a result of being unmasked, it
puts them at greater risk for fraud. Being able to send "targeted spear
phish emails containing the victim's name address and phone number" could
make attempts at fraud and identity theft more dangerous.
Here's the message Google Apps customers received:
Dear Google Apps Administrator,
We are writing to notify you of a software defect in Google Apps’ domain
registration system that affected your account. We are sorry that this
defect occurred. We want to inform you of the incident and the remedial
actions we have taken to resolve it.
When the unlisted registration option was selected, your domain registration
information was not included in the WHOIS directory for the first year.
However, due to a software defect in the Google Apps domain renewal system,
eNom’s unlisted registration service was not extended when your domain
registration was renewed. As a result, upon renewal and from then on forward
, your registration information was listed publicly in the WHOIS directory.
A Google representative provided Business Insider with the following
statement:
A security researcher recently reported a defect via our Vulnerability
Rewards Program affecting Google Apps’ integration with the Enom domain
registration API. We identified the root cause, made the appropriate fixes,
and we're communicating with affected Apps customers. We apologize for any
issues this may have caused.
Read more: http://www.businessinsider.com/google-leaks-whois-data-of-280000-customers-2015-3#ixzz3UlDLFJhS
1 (共1页)
进入Programming版参与讨论
相关主题
Windows GUI developer vs Linux System Defect Analyzer,选哪 (转载)这个IP在哪里
Open-Source Python Code Sets New Standard for Qualitywhois mitbbs.com
急问:大家一般都用什么profiling工具和memory leak的监测工JDK 7u11 released with two vulnerability fixes (转载)
面试时被问到的一个问题Apple's anti-malware blacklists Java 7 plug-in again
Open Position - Research Scientist at McAfee Inc. (转载)Today tried bleeding localhost
python一问macOS/Linux 巨大安全漏洞 shellshock (转载)
这样会不会造成memory leak?这哥们是超级Python黑
请教各位有谁用过国内的手机App外包公司?面试碰到J2EE系统安全性的问题应该怎么回答?
相关话题的讨论汇总
话题: google话题: apps话题: cisco话题: whois