Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
7 Facts: eBay Fumbles Password Reset Warning
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
5/30/2014 | 12:32:00 AM
Notification
I find the notification issues raised here troubling. The safest thing to do would be to do a forced reset, and to make the process for changing user passwords as simple as possible.

BP
dan.euritt
50%
50%
dan.euritt,
User Rank: Apprentice
5/25/2014 | 12:51:13 AM
Re: Ebay password change
I changed my Ebay password, but I'm still getting the reminder to change it. I guess that leaving the notice up is the easiest way to reach everyone.
RetiredUser
50%
50%
RetiredUser,
User Rank: Ninja
5/22/2014 | 1:19:58 PM
Time for Nok Nok Labs?
Not to be flippant, but with Samsung and PayPal turning to Nok Nok Labs, perhaps eBay could follow their lead. Dark Readings has covered Nok Nok Labs many times and I thought this was a nice nutshell: http://www.darkreading.com/risk/nok-nok-labs-delivers-on-vision-for-modern-authentication/d/d-id/1141317?

Their S3 Suite consists of:

-- The NNL(TM) Multifactor Authentication Server (MFAS), which provides a unified, flexible authentication infrastructure that enables user-friendly strong authentication for any device, any authenticator and any application.

-- The NNL(TM) Multifactor Authentication Client (MFAC) Mobile Edition with support for Android and iOS devices, which enables users to authenticate to any application using the existing security capabilities of their mobile devices. Also includes the Mobile App SDK and Authenticator Specific Module (ASM) SDK.

-- The NNL(TM) Multifactor Authentication Client (MFAC) Desktop Edition, with support for Windows 7 and Windows 8, provides user-friendly strong authentication to any application by unleashing the existing security capabilities of billions of desktops and mobile devices.

Call me crazy, but any site dealing with my money had better be securing their infrastructure at a minimum of this level of authentication.
Alison_Diana
50%
50%
Alison_Diana,
User Rank: Moderator
5/22/2014 | 1:19:40 PM
Re: PayPal
Right there with you, Lorna! That was my first question too -- and despite eBay's protestations to the contrary, I'd recommend changing that PayPal password.
Lorna Garey
100%
0%
Lorna Garey,
User Rank: Ninja
5/22/2014 | 11:28:02 AM
PayPal
My immediate thought was, is PayPal affected? I mean, so maybe someone logs in as me and bids on and wins something on eBay. That's bad. Using my PayPal to pay for it?Much, much worse. Nice to hear that "PayPal data is stored separately on a secure network, and all PayPal financial information is encrypted." Would be nicer if that were independently confirmed.


Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12512
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
CVE-2020-12513
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
CVE-2020-12514
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd
CVE-2020-12525
PUBLISHED: 2021-01-22
M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.
CVE-2020-12511
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a Cross-Site Request Forgery (CSRF) in the web interface.