Dropbox had a niggling problem this weekend . The service break its own authentication organisation when it press out a codification update on Sunday afternoon .
The fault have exploiter login to Dropbox without a correct password and was live for four 60 minutes before it was detected . Dropbox fessed up to the simulated - pas afterTechCrunch ran with the storyand bring out the undermentioned statement :
Hi Dropboxers ,

Yesterday we made a code update at 1:54pm Pacific time that introduced a bug bear on our authentication mechanism . We discovered this at 5:41pm and a location was live at 5:46pm . A very small number of exploiter ( much less than 1 pct ) logged in during that period , some of whom could have logged into an account without the right password . As a care , we terminate all logged in Roger Huntington Sessions .
We ’re conducting a exhaustive investigation of related activity to understand whether any accounts were improperly accessed . If we discover any specific instances of unusual activity , we ’ll immediately notify the news report proprietor . If you ’re concerned about any activity that has take place in your account , you’re able to contact us at[email protected ] .
This should never have happened . We are scrutinizing our control and we will be follow up additional safeguards to keep this from hap again .

-Arash
You know the drill — check you Dropbox account , count your files and change your parole if needed .
[ TechCrunchandDropbox ]

CodeDROPBOXglitchPasswordsSecurity
Daily Newsletter
Get the safe technical school , science , and culture tidings in your inbox daily .
News from the future , delivered to your present .
Please select your desire newssheet and submit your email to upgrade your inbox .

You May Also Like










![]()
