Covert Redirect: Certainly not the new heartbleed

4:47 PM
Covert Redirect: Certainly not the new heartbleed -

News reports of organizations on it, a fancy search site (ok, not as pretty as heartbleed), a sexy logo, and blog posts an abundance saying the sky line is down is to have lots to think that OpenID and OAuth defects, known as Covert Redirect, are the new heartbleed.

Where heartbleed was a real security breach compromised the personal information about everyone who goes online, the default Covert Redirect is one that has been known about and treated already

Covert Redirect: Certainly NOT the New heartbleed

Shedding light of Covert Redirect is a mistake. It is not at heartbleed with, but it is still a security flaw that leaves your vulnerable information.

The difference between Covert Redirect and heartbleed is that most major online platforms have been aware for some time now, and repaired way back then. Many had already written blog posts about how they were treated before the story "broke". The problem, it seems, is that while the main connections to the main developers is fine, their third developers parts are not.

How Covert Redirect leaves you vulnerable

Essentially, log in details for your social media accounts can be stolen by websites that are not managed by the parent company. Google, Facebook, PayPal, and LinkedIn

as an example, you can be logged into your Facebook account, but getting a link from an email or another site that asks you connect with Facebook to see your ID. Your information is vulnerable to that.

This is due to the fact that many of these third party developers are using an older version of OAuth 2.0.

Which sites are vulnerable to Covert Redirect

A number of common sites you use online are vulnerable to the flaw Covert Redirect. Examples:

  • Facebook websites vulnerable to covert redirect
  • Google
  • Yahoo
  • Linkin
  • PayPal
  • Microsoft Hotmail
  • QQ
  • Mail.Ru

the level of vulnerability for each site varies, but all are aware of the problem and have long set place measures to control the problem. Everyone has a problem with a third-party developer, it is not "internally".

How to protect yourself against Covert Redirect

Most of you are already protected against Covert Redirect, if you follow some common sense policies:

  • still checking the links before clicking on them
  • never blindly authorize any access to the application or website to your information

in other words, when someone asks you for your information connection, you better be because you started it. Say you want to comment on NFL.com, which requires a Facebook ID. This will show an authorization window, which is fine.

If you were to go to a site that you do not know and have a pop up asking permission to access your Facebook ID, which had better be a clue for you press the "NO ".

as always, good encryption, such as that offered by a quality VPN service provides a protective layer around your data, the login information and everything you do online. Using a VPN is still no reason to blindly give permission to applications and websites, but it can protect your data further in all data breach scenarios.

Previous
Next Post »
0 Komentar