Feeds

E-publisher 'fesses up: 'Apple UDIDs were ours'

BlueToad clears FBI of device data collection

Protecting against web application threats using SSL

It seems both Apple and the FBI were telling the truth: the Apple UDIDs published last week didn’t come from either organization, with an American e-publisher posting a statement that the data was stolen from its systems.

The five-year-old BlueToad, based in Orlando, Florida, says the UDIDs that were posted to Pastebin matched its databases. In this statement, the company apologizes to its customers (complete with the usual bromide about “understanding the importance of protecting the safety and security of information contained on our systems”).

The company’s CEO Paul DeHart told NBC News the file posted by the crackers had a “98 percent” match with the company’s database (suggesting that the entries that didn’t match were added to the database before it was posted).

“That’s 100 percent confidence level, it’s our data,” he says in the NBC News interview, adding that the attack that obtained the data occurred within the last two weeks.

BlueToad now says it’s co-operating with law enforcement in the investigation, and that it apologises to its “partners, clients, publishers, employees and users of our apps”.

The publisher says it has discontinued the collection and reporting of UDIDs. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.