See specifics in the link below. Not eligible for trial members. You get $20 off $40+ spent on items sold by Amazon and not by third parties during 7/12-7/13 Prime Day.
• Offer only applies to eligible Amazon Prime customers who upload at least one photo through the Amazon Photos app for the first time.
• Offer expires at 11:59 p.m. (PT) July 8, 2022.
• Offer is only eligible on purchases during Prime Day between July 12, 2022 at 12:00 a.m. (PT) and July 13, 2022 at 11:59 p.m. (PT).
• Promotional credit will expire at 11:59 p.m. (PT) July 13, 2022.
Get a $20 Amazon credit and enjoy your unlimited photo storage in three easy steps.
You'll receive your credit within four days. The credit expires at 11:59 PM PT on July 13.
1. Get the app
Download and sign into the free Amazon Photos app
2. Upload your photos
Turn on Auto-Save to automatically back up your photos and free up space on your phone
3. Claim your reward
Within 4 days you will receive an email with your $20 Amazon credit
• Customers who were forwarded this offer from parties other than Amazon may not be eligible for this offer.
Thanks. Took only a few minutes yesterday afternoon to download and run the app. Received an email today with a credit of 20 dollars off 40 dollars on Prime Day. Very easy.
Thanks. Just uploaded one photo yesterday and received the credit. I downloaded the app and had another old photo in there so must've done that for a previous promo, so definitely not a one time thing.
Our community has rated this post as helpful.
If you agree, why not thank ?
06-30-2022
at
09:28 AM#11
FYI, if you have been using this app already on Android:
Amazon Fixes High Severity Vulnerability in Amazon Photos Android App
Cybersecurity researchers from Checkmarx have spotted a critical vulnerability affecting the Amazon Photos app on Android.
If exploited, the flaw could allow a malicious application installed on the user's phone to steal their Amazon access token.
From a technical standpoint, the Amazon access token is used to authenticate users across various Amazon application program interfaces (API), some of which contain personally identifiable information (PII) that could be exposed during attacks.
Other APIs, like the Amazon Drive API, could allow threat actors (TA) to gain full access to the user's files.
According to Checkmarx, the vulnerability derived from a misconfiguration of one of the Photos app's components, which would allow external applications to access it.
Whenever this activity was launched, it triggered an HTTP request that carried a header with the customer's access token. The server receiving the request could then be controlled.
"Knowing this, a malicious application installed on the victim's phone could send an intent that effectively launches the vulnerable activity and triggers the request to be sent to a server controlled by the attacker," wrote the researchers.
"With all these options available for an attacker, a ransomware scenario was easy to come up with as a likely attack vector. A malicious actor would simply need to read, encrypt, and re-write the customer's files while erasing their history."
Moreover, Checkmarx explained that it only analyzed a few APIs in its research, constituting a small subset of the entire Amazon ecosystem.
"It's possible that other Amazon APIs would also be accessible to an attacker with that same token," the security experts explained.
Upon discovering this set of vulnerabilities, Checkmarx said its first action was to contact the Amazon Photos development team.
"Due to the high potential impact of the vulnerability and the high likelihood of success in real attack scenarios, Amazon considered this a high severity issue and released a fix for it soon after it was reported."
The news comes a month after a misconfigured database exposed a major coordinated scheme by Amazon vendors to obtain fake reviews for their products.
23 Comments
Sign up for a Slickdeals account to remove this ad.
• Offer expires at 11:59 p.m. (PT) July 8, 2022.
• Offer is only eligible on purchases during Prime Day between July 12, 2022 at 12:00 a.m. (PT) and July 13, 2022 at 11:59 p.m. (PT).
• Promotional credit will expire at 11:59 p.m. (PT) July 13, 2022.
You'll receive your credit within four days. The credit expires at 11:59 PM PT on July 13.
1. Get the app
Download and sign into the free Amazon Photos app
2. Upload your photos
Turn on Auto-Save to automatically back up your photos and free up space on your phone
3. Claim your reward
Within 4 days you will receive an email with your $20 Amazon credit
• Customers who were forwarded this offer from parties other than Amazon may not be eligible for this offer.
For Prime Members: Get a $20 credit for Prime Day when you back up your photos.
Download the Amazon Photos app to a desktop or mobile device and back up a photo. Good for $20 off orders of $40 or more on Prime Day.
Sign up for a Slickdeals account to remove this ad.
Amazon Fixes High Severity Vulnerability in Amazon Photos Android App
Cybersecurity researchers from Checkmarx have spotted a critical vulnerability affecting the Amazon Photos app on Android.
If exploited, the flaw could allow a malicious application installed on the user's phone to steal their Amazon access token.
From a technical standpoint, the Amazon access token is used to authenticate users across various Amazon application program interfaces (API), some of which contain personally identifiable information (PII) that could be exposed during attacks.
Other APIs, like the Amazon Drive API, could allow threat actors (TA) to gain full access to the user's files.
According to Checkmarx, the vulnerability derived from a misconfiguration of one of the Photos app's components, which would allow external applications to access it.
Whenever this activity was launched, it triggered an HTTP request that carried a header with the customer's access token. The server receiving the request could then be controlled.
"Knowing this, a malicious application installed on the victim's phone could send an intent that effectively launches the vulnerable activity and triggers the request to be sent to a server controlled by the attacker," wrote the researchers.
"With all these options available for an attacker, a ransomware scenario was easy to come up with as a likely attack vector. A malicious actor would simply need to read, encrypt, and re-write the customer's files while erasing their history."
Moreover, Checkmarx explained that it only analyzed a few APIs in its research, constituting a small subset of the entire Amazon ecosystem.
"It's possible that other Amazon APIs would also be accessible to an attacker with that same token," the security experts explained.
Upon discovering this set of vulnerabilities, Checkmarx said its first action was to contact the Amazon Photos development team.
"Due to the high potential impact of the vulnerability and the high likelihood of success in real attack scenarios, Amazon considered this a high severity issue and released a fix for it soon after it was reported."
The news comes a month after a misconfigured database exposed a major coordinated scheme by Amazon vendors to obtain fake reviews for their products.
https://www.infosecurit
Just backup one photo.
I backup up 6 photos on my non prime account the other day and got a $10 credit good for anytime
This is a limited-time offer for customers who meet the eligibility criteria for this promotion.