Microsoft has been "reimagining" itself for years, but after a security researcher had his Skype account hijacked six times in one day, he wants Skype Support to reimagine itself with more security.
Microsoft switched its company and some brand logos last year, but it intends to change logos for Bing, Skype, Visual Studio, Yammer and Xbox as well. According to the "reimagining of Microsoft" talk at Design Day 2013 in Norway, Windows Phone design studio general manager Albert Shum has been working with creative director Todd Simmons from the external marketing firm Wolff Olins. The duo reportedly revealed the new logos for Bing and either Skype or Yammer below:
According to Paul Thurrott, Shum was the person "most directly responsible" for the "Metro" design. Wolff Olins has worked on marketing for Windows 8; Simmons advised Microsoft to break the "habit of version branding" and to "go from a sales mentality to seduction; let the products speak for themselves." Nike was used for design inspiration and the goal was to create a "Microsoftness" across all brands.
Regarding Windows Phone, WinBeta reported that Microsoft doesn't want to make icons prettier, since "they are really just buttons," a snarky dig at the phone icons for Apple's iOS and Google's Android operating system. For Windows Phone, Microsoft wants to "take away what you don't need and focus on the user experience."
Social Engineering Skype Support to hijack Skype accounts
Speaking of Microsoft and user experience, security researcher @TibitXimer complained about a horrible user experience after losing control of his Skype account six times in one day. In fact, Ximer says Skype recovery mechanisms are so inadequate that "anyone can steal your Skype account" by providing:
- 3-5 of your contacts on skype
- 1 email you've used on skype at any point
- your first and/or last name
Ximer provided screen captures of his conversation with Skype Customer Support and is trying to raise enough outrage and awareness to force Skype to change its recovery policy. He wrote on the Skype forum:
Due to my account being stolen (not hacked) through skype support (because Skype support didn't verify if the person owned the account or not, just wanted those 3 points mentioned above) my account was used to scam people out hundreds of dollars along with damaging my reputation for my product's security due to thinking I had low security on my skype account or email address, when in reality, it was Skype Support's fault my account was stolen, multiple times, and had nothing to do with End-users (me in this case).
Unsurprisingly, Skype Support disagrees with Ximer about how easily Skype accounts can be hijacked by social engineering the support team. "Skype CS is looking into your case. Our unlock policy does in fact require more than just the information you have quoted and we are checking where the failure happened during the required steps of verification."
Other Skype users on the forum pointed out that there are guides for sale that explain how to easily exploit Skype Support and steal accounts.
Ximer said Skype Support has now suspended his account while the matter is being investigated. He added that Skype account hijacking has also "happened to many members of a forum I'm on all in the same week," before providing a screenshot of other users complaining about it. He then wrote, "This was a massive failure by Skype support. While they may ask more questions during the verification process, they did not require that all questions were answered. Majority of the time they only required those 3 steps as enough for the verification of the account owner."
Years ago, the Google Gmail team explained "two hidden ways" to manipulate your Gmail address, such as adding a plus "+" sign, or by adding one or more dots "." to your current Gmail address. For example "email@example.com" could be tweaked into "firstname.lastname@example.org," or "email@example.com" The "periods" and plus sign are ignored, but can be used for added security and privacy—or to help you by tracking who sells your email address.
By the way, if you try this trick of adding "." or dots with a Hotmail address, it bounces with the error: "Delivery to the following recipient failed permanently." However, an address such as "firstname.lastname@example.org" will successfully send.
Update: After Microsoft read this article, it sent the following statement:
We take the security of our customers extremely seriously, and have been making ongoing enhancements to help protect customers. We have processes in place that would help protect against password reset scenarios such as this, and our customer support agents remain available to help customers as needed. We encourage customers to use Microsoft account to log into Skype, which helps make their accounts more secure using two-step verification. For more information about individual accounts, customers can contact Skype by visiting: https://support.skype.com/en/faq/FA1170/how-can-i-contact-skype-customer.... –A Skype Spokesperson
Like this? Here's more posts:
- Law professor makes a case for legally recognizing the Dangers of Surveillance
- PETA plans to spy on hunters with drones
- Hackers steal photos, turn Wi-Fi cameras into remote surveillance device
- Microsoft Phones, tablets as gaming controllers that detect gritting teeth, blinking?
- Post Boston: Privacy advocates warn about coming tsunami of surveillance cameras
- Hacks to turn your wireless IP surveillance cameras against you
- Verizon report: China behind 96% of all cyber-espionage data breaches
- Air Force hackers win NSA's 13th annual Cyber Defense Exercise
- Microsoft: Facebook Home is a copycat, Windows Phone is the 'real thing'
- AV-Test issues first Windows 8 antivirus solution ratings
- Intelligence system FAIL: Tsarnaev wiretapped, listed in terrorism database
- Hacktivists take on 'Olympus Has Fallen' scare tactics style
Follow me on Twitter @PrivacyFanatic
Ms. Smith (not her real name) is a freelance writer and programmer with a special and somewhat personal interest in IT privacy and security issues. Smith has a diverse background in information technology, programming, web development, IT consulting, and information security. She focuses on the unique challenges of maintaining privacy and security, both for individuals and enterprises. She has worked as a journalist and has also penned many technical papers and guides covering various technologies. Smith is herself a self-described privacy and security freak.
Smith is an independent contractor and is not affiliated with any vendor that makes or sells information technology.
Policy on comments: Respectful discussion is welcomed! However comments that use inappropriate language, consist of name calling or personal attacks, or include accusations of wrongdoing are not appropriate. Those comments will be deleted or edited