Remove tag do-not-call
article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Both during this week and over previous years, there's been various headlines calling the security posture of Aadhaar into question and the Indian government has been vehemently refuting any suggestion that the system isn't top notch. agarwal_mohit) January 5, 2018. They claim that they're hack-proof. Of course it can!

Security 111
article thumbnail

Security Keys

Imperial Violet

Predictions of, and calls for, the end of passwords have been ringing through the press for many years now. Security Keys are another attempt address this problem—initially in the form of a second authentication factor but, in the future, potentially as a complete replacement. Introduction. Contrasts with existing solutions.

Security 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role might the security industry have in identifying or even stopping it? The Federal Trade Commission in the United States, banned an app called SpyPhone, and its CEO Scott Zuckerman, from operating in the surveillance industry. Apps that haven't yet been flagged as such, but do the same thing. In early September 2021.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

In this episode, The Hacker Mind looks at some of the work Dr. Kevin Fu has been doing at the University of Michigan, such as using laser pointers to pwn voice-activated digital assistants, and using specific frequencies of sound to corrupt or crash hard disk drives. What about using light? What about using sound? But it turns out it does.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

In this episode, The Hacker Mind looks at some of the work Dr. Kevin Fu has been doing at the University of Michigan, such as using laser pointers to pwn voice-activated digital assistants, and using specific frequencies of sound to corrupt or crash hard disk drives. What about using light? What about using sound? But it turns out it does.

article thumbnail

The Hacker Mind Podcast: Hacking With Light And Sound

ForAllSecure

In this episode, The Hacker Mind looks at some of the work Dr. Kevin Fu has been doing at the University of Michigan, such as using laser pointers to pwn voice-activated digital assistants, and using specific frequencies of sound to corrupt or crash hard disk drives. What about using light? What about using sound? But it turns out it does.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Part 2 will discuss the critical factors for a successful DT journey, because organizations need to do a “mind-shift” from traditional records and information management (RIM) practices to content services (CS). Two years earlier, Vannevar Bush put forth the idea of an information system device he called ‘memex.’ Content Services (CS).