Search Results for: intermediary
Aadhar authentication is unreliable
[I am one of the vocal supporters of the Modi’s initiatives on Note ban and other measures. However, it is necessary to bring instances such as the following to the attention of the public since they indicate the unknown risks … Continue reading
Responsibility of IT companies for Cyber Security
A debate has ensued in Germany that IT industry should be held responsible for security breaches affecting the public. According to this report “Leading German politicians have called for IT and telecoms equipment makers to be held liable for cyber attacks, … Continue reading
The Tesco Bank Attack..Yet another incident of Security Failure
The UK based Tesco Bank recently observed suspicious transactions in around 40000 Current Accounts and had to temporarily shut down transactions in the accounts. Subsequently it was indicated that about 9000 accounts saw fraudulent withdrawals to the total extent of … Continue reading
RE-identification of De-identified Personal Information is an offence in Australia
n amendment bill has been tabled in Australia to amend the Privacy Act 1988 to prohibit conduct related to the re-identification of de-identified personal information published or released by Government entities. (See Details here) According to the provisions of the … Continue reading
Chroma Key Morphing alleged in Hillary Clinton Video..A lesson for Cyber Forensic Specialists
Some time back, there was a lot of discussion in India about a video in JNU in which allegations that anti India slogans were raised. There were two versions of the video one in which there were clear indications that … Continue reading
Automation in Healthcare Requires Manual Override for security
Two incidents reported yesterday in two different hospitals highlight the risk in automation of health care processes and the criticality of information security. In one of the incidents, a virus left three hospitals in disarray and cancellation of all routine … Continue reading