Hotel clients’ details exposed

0
Hotel clients' details exposed
Card details may have been exposed.

THE personal details of millions of clients of Hotels.com, Booking.com, Expedia and other hotel reservation platforms have reportedly been left exposed.

-- Advertisement --

This includes names, credit card details, ID numbers and reservation details.

Prestige Software, based in Spain, sells a software service called Cloud Hospitality, a tool used by hotels to update their availability on the major booking websites.


A misconfiguration in an Amazon Web Services (AWS) S3 bucket, a popular form of cloud-based storage, caused more than 10 million individual log files containing extremely sensitive personal information from as far back as 2013 to be exposed.

This includes credit card details from clients worldwide, potentially putting them at risk of fraud and online attacks, although it is unknown whether the data was stolen before the security breach was discovered.


Prestige Software is at risk of having its permission to accept and process credit card payments taken away for breach of the Payment Card Industry Data Security Standard (PCI DSS).

A security team at Website Planet, a group of ethical security research experts that discover and disclose serious data breaches as a free service, discovered and reported the security breach.


Thank you for taking the time to read this news article “Hotel clients’ details exposed”. For more UK daily news, Spanish daily news and Global news stories, visit the Euro Weekly News home page.

Euro Weekly News is delighted to continue to be able to bring you a range of News from around Spain in English and Global News live as it happens.

Euro Weekly News doesn’t cost you anything but your internet connection. Whether it’s bringing you the local Spanish news or the International news today, we’ve got you covered!

Euro Weekly News, the leading free local and national newspaper in Spain, the people’s paper, we lead others follow!





LEAVE A COMMENT

Please enter your comment!
Please enter your name here