Site icon TechNewsBoy.com

Popular apps have vulnerabilities in how they connect to the cloud. At risk is users’ personal data.

Synopsis

A Bengaluru-based risk-management firm has found issues in how apps are securing their AWS keys. Over 40 popular apps, with more than 100 million downloads each, are vulnerable to losing data of its users. What happens in the event of a data breach? What should one do? Above all, how are companies dealing with such situations?

It was an oops moment for Andrew Hoffman, the founder of free coding resource DevFactor, back in 2015. Just five-odd minutes were all it took for hackers to mine cryptocurrency, taking advantage of his Amazon Web Services (AWS) keys that he had published accidentally on a repository of the developer platform GitHub. Within minutes, they generated a mining bill of USD2,375. The keys were pulled back immediately, but “they were already gone”,

  • GIFT ARTICLE
  • FONT SIZE
  • SAVE
  • PRINT
  • COMMENT

Sign in to read the full article

You’ve got this Prime Story as a Free Gift

Already a Member?

NEW ON ET PRIME

Comprehensive and In-depth Reports on 4,000+ Stocks, updated daily

Subscribe Now

NEW ON ET PRIME

Comprehensive and In-depth Reports on 4,000+ Stocks, updated daily

Subscribe Now

NEW ON ET PRIME

Comprehensive and In-depth Reports on 4,000+ Stocks, updated daily

Subscribe Now

Why ?

  • Exclusive Economic Times Stories, Editorials & Expert opinion across 20+ sectors

  • Stock analysis. Market Research. Industry Trends on 4000+ Stocks

  • Clean experience with
    Minimal Ads

  • Comment & Engage with ET Prime community

  • Exclusive invites to Virtual Events with Industry Leaders

  • A trusted team of Journalists & Analysts who can best filter signal from noise

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Read original article here

Denial of responsibility! TechNewsBoy.com is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – abuse@technewsboy.com. The content will be deleted within 24 hours.
Exit mobile version