AWS Support – The First Decade

AWS Support – The First Decade

We launched AWS Support a full decade ago, with Gold and Silver plans focused on Amazon EC2, Amazon S3, and Amazon SQS. Starting from that initial offering, backed by a small team in Seattle, AWS Support now encompasses thousands of people working from more than 60 locations. A Quick Look Back Over the years, that… Read more »

The Security Risks of Login With Facebook

The Security Risks of Login With Facebook

New research from Princeton University exposes vulnerabilities in the social network’s universal login API. Source: Wired Security The Security Risks of Login With Facebook

Get Started with Blockchain Using the new AWS Blockchain Templates

Get Started with Blockchain Using the new AWS Blockchain Templates

Many of today’s discussions around blockchain technology remind me of the classic Shimmer Floor Wax skit. According to Dan Aykroyd, Shimmer is a dessert topping. Gilda Radner claims that it is a floor wax, and Chevy Chase settles the debate and reveals that it actually is both! Some of the people that I talk to… Read more »

How DNA Transfer Nearly Convicted an Innocent Man of Murder

How DNA Transfer Nearly Convicted an Innocent Man of Murder

We leave traces of our genetic material everywhere, even on things we’ve never touched. That got Lukis Anderson charged with a brutal crime he didn’t commit. Source: Wired Security How DNA Transfer Nearly Convicted an Innocent Man of Murder

New – Registry of Open Data on AWS (RODA)

New – Registry of Open Data on AWS (RODA)

Almost a decade ago, my colleague Deepak Singh introduced the AWS Public Datasets in his post Paging Researchers, Analysts, and Developers. I’m happy to report that Deepak is still an important part of the AWS team and that the Public Datasets program is still going strong! Today we are announcing a new take on open… Read more »

Inside the Unnerving CCleaner Supply Chain Attack

Inside the Unnerving CCleaner Supply Chain Attack

CCleaner owner Avast is sharing more details on the malware attackers used to infect legitimate software updates with malware. Source: Wired Security Inside the Unnerving CCleaner Supply Chain Attack

Page 1 of 11912345...102030...Last »