- Is that Rosa Parks in random Twitter user’s baby photo? Tuesday 8:24 PM
- Syracuse students say white supremacist manifesto was AirDropped to them Tuesday 7:44 PM
- Florida woman gets prison time for throwing slushie at Matt Gaetz Tuesday 6:28 PM
- Marie Kondo’s online store slammed for selling clutter-worthy products Tuesday 5:34 PM
- People are rallying against toxic masculinity on International Men’s Day Tuesday 4:42 PM
- Reddit wants to stop its pro-Trump forum from outing the alleged whistleblower Tuesday 3:38 PM
- White woman calls cops on man who said he was visiting aunt with his kids Tuesday 3:12 PM
- ‘The Stranded’ is a flawed yet addictive blend of ‘Degrassi’ and ‘Lost’ Tuesday 2:45 PM
- The ‘gonna tell my kids’ meme is revisionist history at its most absurd Tuesday 2:24 PM
- Redditor asks former burglars to give home security tips Tuesday 2:18 PM
- Facebook-Breitbart partnership under fire in wake of new Stephen Miller emails Tuesday 2:00 PM
- John Krasinski under fire after praising the CIA Tuesday 1:46 PM
- Conservatives melt down after Chick-fil-A says it will stop donating to anti-LGBTQ orgs Tuesday 1:33 PM
- ‘Honey Boy’ is an experimental look at channeling trauma Tuesday 1:28 PM
- Disney+ now allows users to resume and restart content Tuesday 11:42 AM
The United States Postal Service (USPS) has reportedly fixed a security flaw that exposed data on 60 million of its online users.
According to cybersecurity expert Brian Krebs, the issue was first discovered by a security researcher more than a year ago and allowed any USPS.com account holder to view other users’ private data.
The security researcher, who asked to remain anonymous, was reportedly ignored by the USPS at the time despite revealing that user data—including account numbers, email addresses, street addresses, and phone numbers—were at risk.
“The problem stemmed from an authentication weakness in a USPS Web component known as an ‘application program interface,’ or API—basically, a set of tools defining how various parts of an online application such as databases and Web pages should interact with one another,” Krebs wrote.
After being alerted to the issue by Krebs, who was contacted by the security researcher last week, USPS promptly patched the vulnerability.
Despite recently carrying out a security audit of its systems, USPS failed to locate the problem itself.
Speaking with Krebs, Nicholas Weaver, a researcher at the International Computer Science Institute and lecturer at UC Berkeley, described the issue as catastrophic.
“This is not even Information Security 101, this is Information Security 1, which is to implement access control,” Weaver said. “It seems like the only access control they had in place was that you were logged in at all. And if you can access other peoples’ data because they aren’t enforcing access controls on reading that data, it’s catastrophically bad and I’m willing to bet they’re not enforcing controls on writing to that data as well.”
- Free reverse phone lookup with Google: How it works
- How to see all the people who unfriended you on Facebook
- The 10 best torrent sites that are still up and running
Mikael Thalen is a tech and security reporter based in Seattle, covering social media, data breaches, hackers, and more.