4 million personal records of Time Warner cable customers exposed


About 4 million personal records of Time Warner Cable customers have been exposed for having been stored in an Amazon server with no password. "The two repositories contained thousands and thousands [of] records and reports for a number of Broadsoft clients, with Time Warner Cable appearing to be the most prominent", Kromtech's Bob Diachenko blogged. BroadSoft tells Gizmodo that it locked down its Amazon data (Charter says it was taken down) and hasn't seen evidence that intruders accessed the information.

The information was removed immediately after the discovery and the incident is being investigated, Charter said.

Time Warner Cable and Bright House were both acquired past year by Charter Communications, which is the second-biggest US cable company after Comcast.

Weeks after the "Game of Thrones" episode leaks admitted by an Indian technology company - a Star India partner, another data leak is being blamed on India.

The breach was discovered by a third party firm that was working to resolve a data breach at another company. Kromtech said it downloaded the contents of the publicly accessible BroadSoft data "for verification purposes".

North Korean Leader Inspects New H-Bomb
Absent that understanding, China will continue to run out the clock until North Korea can strike US cities with nuclear weapons. It said the underground test site did not leak radioactive materials, which would make such a determination even harder.

"The bottom line is that data is valuable and there will always be someone looking for it".

According to Time Warner Cable parent Charter Communications, "There is some nonfinancial information of TWC customers, especially for those who used the MyTWC app, which may be visible to external individuals". It did not mention how many subscribers were impacted in the exposure.

Meanwhile, Uber Technologies Inc has agreed to two decades of audits after U.S. regulators found the ride-services company failed to protect the personal information of drivers and passengers and deceived the public about efforts to prevent snooping by its employees. "We apologize for the frustration and anxiety this causes, and will communicate directly to customers if their information was involved in this incident".

A spokesperson for BroadSoft also confirmed the exposure, but said the company does not believe that the exposed data was "highly sensitive" or accessed by any threat actors.

"Just as most organisations have adopted advanced threat defence solutions for their on-premise networks, they should also consider implementing solutions that provide advanced threat defence for the cloud".