Using a combination of relatively low-tech techniques and tools, security researchers have discovered that they can access the contents of one in six Amazon Simple Storage Service (S3) buckets. Those ...
UPDATE – With companies flocking to cloud services such as Amazon Simple Storage Service (S3) to store and serve static content on the cheap, naturally they’re making simple mistakes in doing so—and ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...
Editors' note: This article and its headline was updated to correct details about ownership of the S3 bucket and contents therein. Another week, another publicly accessible AWS storage cloud found to ...
Each new week seemingly brings with it another disturbing discovery of personal data left unsecured and exposed on the internet. Different companies — spanning industries as varied as pornography, ...
Personal and business data belonging to Boston area meeting and hotel booking provider Groupize was discovered in a publicly accessible Amazon Web Services S3 bucket, which has since been locked down.
Thousands of Americans with classified security clearance had their personal information exposed over the weekend by a misconfigured Amazon server. Around the same time, another unsecured Amazon ...
Facepalm: Amazon S3 buckets, part of the Amazon Web Services infrastructure, are great for storing and managing huge amounts of data at scale, but they can also become a financial and security risk if ...