article thumbnail

1,859 Android and iOS apps were containing hard-coded Amazon AWS credentials

Security Affairs

This finding suggests a potential supply chain vulnerability, these AWS access tokens are often exposed through shared library, third-party SDK, or other shared components used by the development teams. In some cases, the presence of the access keys has no specific reason, in other cases, they are part of testing and never removed code.

Cloud 96
article thumbnail

Download IGI’s Whitepaper: GDPR Myths & Misconceptions

IGI

In fact, in 2018, “the most important data privacy regulation in 20 years” will go into effect. Authorities, wielding the power of massive fines, will enforce this law on all organizations that process the personal data of European Union (EU) residents, regardless of where those organizations are based.

GDPR 20