Disclaimer: as technology changes, advisories may become out of date or may no longer be relevant, please refer to the "Date" section of the header to be sure the advisory is recent as pertains to your situation.
Digibase Security Advisory - Mail Interception by Linkedin
Keywords: Linkedin, Mail, MiTM, Man-in-the-Middle, Interception, Linkedin Intro
DBSA ID: 2013-0007
Regarding: Mail Interception by Linkedin
Date: 2013 10 24
Last Modified: 20131029045659 by Kradorex Xeron
Who should take note: Apple iOS (iPhone, iPad, iTouch) and Linkedin Users
Rationale: Users and organizations must act to ensure their mail is not compromised by a third party.
Rationale: The compromises can result in confidential information being intercepted by a third party not privy to such information.
Spread of Issue: SINGLE-PLATFORM HIGH
Rationale: Users of iOS and Linkedin are suseptable to utilizing the software.
Linkedin is releasing a software product named "Linkedin Intro" that promises to integrate iOS mail clients with the Linkedin service, promising to provide information on how people are connected and other information to users. This is performed by piping/proxying mail accessed through Linkedin's servers to process the incoming mail regardless on who hosts the mail server. Digibase classifies this software as trojan spyware as it provides a promise of positivity but bait and switches it with scanning information not privy to them.
All users affected are advised not to utilize the "Linkedin Intro" software and to remove it if it exists already on devices. It is further advised to treat this software as malware.