Their official statement blaming user's passwords- archive.is snapshot Update: TV still denies a breach even with this thread linked. Teamviewer must know they are being targeted, and the stakes are high as the software allows complete access to a trusted machine - it's basically a master key - and there hasn't been a single response with teeth from teamviewer. This has happened on other sites where they had no critical information and within 48 hours everyone's logged in sessions were logged out, an email went round saying you had to click the link in the email (to verify ownership) and set up two factor auth as they knew they were being targeted. Teamviewer is being used as a vector of attack. One of the main problems are that they are not taking responsibility: (quoted from /u/rich-uk ) Some also suggest that their DNS servers were hijacked and the clients believed the fake server, being the method of the attack. TV is blaming users with reusing passwords, yet users with 2FA and unique very long generated passwords were hacked. Users are reporting breaches, and thousands of dollars have been stolen with the client, all over /r/teamviewer and at their support Twitter account. "This issue is not getting enough attention, please spread it.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |