Search Results for: intermediary

Aadhar authentication is unreliable

[I am one of the vocal supporters of the Modi’s initiatives on Note ban and other measures. However, it is necessary to bring instances such as the following to the attention of the public since they indicate the unknown risks … Continue reading

Posted in Cyber Law | Leave a comment

Responsibility of IT companies for Cyber Security

A debate has ensued in Germany that IT industry should be held responsible for security breaches affecting the public. According to this report  “Leading German politicians have called for IT and telecoms equipment makers to be held liable for cyber attacks, … Continue reading

Posted in Cyber Law | Leave a comment

The Tesco Bank Attack..Yet another incident of Security Failure

The UK based Tesco Bank recently observed suspicious transactions in around  40000 Current Accounts and had to temporarily shut down transactions in the accounts. Subsequently it was indicated that about 9000 accounts saw fraudulent withdrawals to the total extent of … Continue reading

Posted in Cyber Law | Leave a comment

RE-identification of De-identified Personal Information is an offence in Australia

n amendment bill has been tabled in Australia to amend the Privacy Act 1988 to prohibit conduct related to the re-identification of de-identified personal information published or released by Government entities. (See Details here) According to the provisions of the … Continue reading

Posted in Cyber Law | Leave a comment

Chroma Key Morphing alleged in Hillary Clinton Video..A lesson for Cyber Forensic Specialists

Some time back, there was a lot of discussion in India about a video in JNU in which allegations that anti India slogans were raised. There were two versions of the video one in which there were clear indications that … Continue reading

Posted in Cyber Crime | Leave a comment

Automation in Healthcare Requires Manual Override for security

Two incidents reported yesterday in two different hospitals highlight the risk in automation of health care processes and the criticality of information security. In one of the incidents, a virus left three hospitals in disarray and cancellation of all routine … Continue reading

Posted in Cyber Law | Leave a comment