DBSA:2013-0007

From Digibase Knowledge Base
Revision as of 23:12, 24 October 2013 by Kradorex Xeron (talk | contribs) (Created page with "'''DBSA ID:''' {{PAGENAME}} '''Regarding:''' Mail Interception by Linkedin '''Writeup:''' ~~~~ '''Date:''' 2013 10 24 '''Last Modified:''' {{REVISIONTIMESTAMP}} by {{REVIS...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

DBSA ID: 2013-0007

Regarding: Mail Interception by Linkedin

Writeup: Kradorex Xeron (talk) 00:12, 25 October 2013 (EDT)

Date: 2013 10 24

Last Modified: 20131024231252 by Kradorex Xeron

Who should take note: iOS (iPhone, iPad, iTouch) Users

Classification

Priority: HIGH

Rationale: Users and organizations must act to ensure their mail is not compromised by a third party.

Severity: MODERATE

Rationale: The compromises can result in confidential information being intercepted by a third party not privy to such information.

Spread of Issue: SINGLE-PLATFORM HIGH

Rationale: Users of iOS and Linkedin are suseptable to utilizing the software.

Description

Linkedin is releasing a software product named "Linkedin Intro" that promises to integrate iOS mail clients with the Linkedin service, promising to provide information on how people are connected and other information to users. This is performed by piping/proxying mail accessed through Linkedin's servers to process the incoming mail regardless on who hosts the mail server. Digibase classifies this software as trojan spyware as it provides a promise of positivity but bait and switches it with scanning information not privy to them.

Mitigation/Solution

All users of iOS devices are advised not to utilize the "Linkedin Intro" software and to remove it if it exists already on devices.

References