Updated News Around the World

Popular apps have vulnerabilities in how they connect to the cloud. At risk is users’ personal data.

Synopsis

A Bengaluru-based risk-management firm has found issues in how apps are securing their AWS keys. Over 40 popular apps, with more than 100 million downloads each, are vulnerable to losing data of its users. What happens in the event of a data breach? What should one do? Above all, how are companies dealing with such situations?

It was an oops moment for Andrew Hoffman, the founder of free coding resource DevFactor, back in 2015. Just five-odd minutes were all it took for hackers to mine cryptocurrency, taking advantage of his Amazon Web Services (AWS) keys that he had published accidentally on a repository of the developer platform GitHub. Within minutes, they generated a mining bill of USD2,375. The keys were pulled back immediately, but “they were already gone”,

  • GIFT ARTICLE
  • FONT SIZE
  • SAVE
  • PRINT
  • COMMENT

Sign in to read the full article

You’ve got this Prime Story as a Free Gift

Already a Member?

Special Offer on ET Prime

Subscribe to ET Prime – Get Flat 20% Off

View Plans

Special Offer on ET Prime

Subscribe to ET Prime – Get 25% Off

View Plans

Special Offer on ET Prime

Subscribe to ET Prime – Get 25% Off

View Plans

Why ?

  • Sharp Insight-rich, Indepth stories across 20+ sectors

  • Access the exclusive Economic Times stories, Editorial and Expert opinion

  • Clean experience with
    Minimal Ads

  • Comment & Engage with ET Prime community

  • Exclusive invites to Virtual Events with Industry Leaders

  • A trusted team of Journalists & Analysts who can best filter signal from noise

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Read original article here

Denial of responsibility! NewsUpdate is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.