Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
In short, the very four digits (of a credit card number) that Amazon considers unimportant enough to display in the clear on the web are precisely the same ones that Apple considers secure enough to perform identity verification.
I do think that shows how ad hoc and poorly planned many security procedures are.
Job motivation: how the powerful steal from the stupid.
you would have thought that Apple would have run their security systems by a few experts before allowing remote wipe and chaining.
Ah, just Apple getting the blame is it? Despite the fact that it was only Amazon's ludicrously insecure procedures that allowed them to hack Apple's system as the second step in the process?
Yes, you'd expect better than that from Amazon and Apple.
Ah, just Apple getting the blame is it? Despite the fact that it was only Amazon's ludicrously insecure procedures that allowed them to hack Apple's system as the second step in the process?
good point they managed to get into Amazon's system as well, add a credit card and view the last 4 digits of another card a bit like every person who looks at a credit card receipt.
Now if they had been able to order a £100k of porn and deliver to another address then Amazon might have been in a worse state. But they didn't.
Apple only allowed them to remotely own all his apple devices.
Comment