The unguarded data was found by Chris Vickery, director of cyber risk research at UpGuard, a security firm, who privately reported this problem to Verizon in late June. Nice also commented that the data was "part of a demo system", but refused to elaborate. The security hole was plugged by June 22. Vickery also discovered earlier this year that some information of almost 200 million voters was exposed by a data firm working for Republican Party clients.
Almost 6 million Verizon customers may be at risk after it was discovered that cloud storage for the cellular communications giant was hacked. If these were mobile phone numbers, they could have allowed potential attackers access to customers' Verizon accounts.
On 12 July, security experts claimed "as many as 14 million" Verizon customers subscribed to a customer service line managed by Nice Systems, an Israeli firm, had their names, addresses and personal Verizon account numbers left at risk online by a leaky database.
Martial law in Mindanao helped neutralize Maute infrastructure - Lorenzana
General Restituto Padilla, Jr. said they are still assessing the situation in Marawi on whether or not the said extension befits. Pimentel said a meeting with Duterte was set on July 17 with the proposed Bangsamoro Basic Law (BBL) as the official agenda.
Gartner analyst Avivah Litan said the issue comes down to human error and it doesn't make sense to blame cloud service providers like Amazon and Google. The company, which said an "overwhelming majority of information in the data set had no external value", asserted that nobody malicious has had access to the information. The PIN numbers are used to authenticate a caller phoning into the wireline call center and can't be used to access customer accounts online, the statement said. Sophisticated state actors, looking for, say, information on government workers, were of particular concern, he added.
However, UpGuard said this exposure is a potent example of the risks of third-party suppliers handling sensitive data. Hopefully nothing bad comes from this data exposure, but it sure would be nice if we could stop worrying these things after a leak or breach has already taken place. "Or they could cut off access to the real account holder".
"This breach demonstrates the fact that while cloud services like AWS can be secure, it is up to the organisations using them to ensure that these services are configured in a secure fashion", said Rich Campagna, CEO, Bitglass. According to ZDNet, NICE security measures were not set up properly because it made a security setting public on an Amazon S3 storage server, instead of making it private.