Higher late than by no means
Australian safety advisor Brett Randall posted in regards to the safety gap over the course of a number of months and mentioned he noticed greater than 100,000 views on these LinkedIn posts.
“This now brings Microsoft Authenticator again on par with different phone-based TOTP authenticators. It now not permits the unintended overwriting of TOTP keys when sure situations, together with reused electronic mail addresses, are current, which was successfully locking customers out of unrelated techniques with little warning,” Randall wrote on LinkedIn. “Thanks, Microsoft, for fixing the problem, even when it was far more durable than it wanted to be to get an acknowledgement that the problem existed.”
Tim Erlin, API safety chief at Wallarm, was one in all many customers final month who confirmed the Microsoft Authenticator concern. “Though it looks like it wasn’t straightforward to get addressed, it’s nice to see that Microsoft has mounted this concern with their Authenticator app. There’s little doubt that it’ll forestall future complications for his or her customers,” Erlin mentioned.