Search Results for: bug bounty
Flipkart Flash Sale Fraud… How to respond?
Today, I got a WhatsApp message about some attractive offers titled “Flipkart Big Freedom Sale Offers”. The order placement URL was given as http://flipkart.flash-sale-offer.com. To complete the sale the requirement was that the message had to be shared with atleast … Continue reading
The Three Plus One dimensions of Information Security
In the past we have highlighted the three dimensional approach to Information security which combines Technical, Legal and Behavioural science as the dimensions of Information Security. Uni-Dimensional Approach Information Security has often been approached as a “Uni-Dimensional” concept based on … Continue reading
Can a Programmer be a good Compliance Official?
Who would make an effective Compliance official in an organization? is a question that troubles many in the management. In large organizations, there is no dearth of people or capacity to appoint professionals and hence there could be several persons … Continue reading
Software Application is not a mere piece of coding…There is business behind it
My article on the Bank of Maharashtra(BOM) UPI fraud where in I had expressed an opinion that NPCI and RBI also have some responsibility elicited some off the record remarks from NPCI and one of the senior technical members of … Continue reading
Draft Rules for Security of Prepaid Instruments released for public comments
As a part of the “Reasonable Security Practices” under Section 43A of ITA 2000/8, Government of India has released draft rules called “Information Technology (Security of Prepaid Payment Instruments) Rules, 2017” for public comments. A copy of the draft rules … Continue reading
A Broker for Zero Day Vulnerabilities?
The way the underworld for Cyber Crime tools has developed indicates how complicated is the world of Cyber Crimes from the law enforcement issue. Cyber Criminals are difficult to catch both because they are anonymous and spread across the globe and … Continue reading