[Michael Kassner reporting][1] on the [reverse-engineering of the Dropbox client][2]:
> The paper goes to great lengths explaining how Dhiru and Przemyslaw successfully gained access to a victim’s Dropbox account and files. The two also mentioned in the paper with each new version of Dropbox, developers were able to harden the client’s security, which in turn eliminated one or more attack vectors.
Essentially they figured out how Dropbox auto-authenticates you into Dropbox.com when you click the link to launch the website from the app. What always worries me about these types of hacks, the same as Kassner worries, is how long they have been in the wild without anyone knowing.
I don’t feel nearly as optimistic about Dropbox security as [Gabe does][3]. It feels to me that the better target for hackers now is services like iCloud, Dropbox, and SkyDrive instead of attacking OSes. Why bother attacking a physical machine running Windows or OS X, if you can instead target a service that stores the actual *files* for millions of physical machines?
I feel like this is just a tip of a very large iceberg surrounding cloud file storage.
[1]: http://www.techrepublic.com/blog/it-security/researchers-reverse-engineer-the-dropbox-client-what-it-means/?utm_medium=App.net&utm_source=PourOver
[2]: https://www.usenix.org/system/files/conference/woot13/woot13-kholia.pdf
[3]: http://www.macdrifter.com/2013/08/dropbox-reverse-engineered-link.html
Note: This site makes use of affiliate links, which may earn the site money when you buy using those links.