Using two sets of weak, easy-to-guess usernames and passwords, a security researcher accessed an internal Sprint staff portal. Because the portal’s log-in page didn’t use two-factor authentication, the researcher -- who did not want to be named -- navigated to pages that could have allowed access customer account data.
- Read the article: TechCrunch