Remove tag australia
article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

It's operating in an era of increasingly large repositories of personal data held by both private companies and governments alike. It's not the only such claim either; earlier last year in the wake of another security controversy, another similarly spectacular claim was made : In public, UIDAI claimed Aadhaar was completely secure.

Security 111
article thumbnail

Humanitarian Collaboration | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Doctors can now use mobile devices to to tag patient condition and sending, for example, xrays from Africa to India by mobile network to be checked by doctors and diagnosed. Hot Topics iPhone iPad Enterprise 2.0

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role might the security industry have in identifying or even stopping it? Lodrina Cherne and Martijn Grooten join the The Hacker Mind podcast to discuss their Black Hat USA 2021 presentation. Welcome to the hacker mind, in original podcast from for all security. It's an important topic, with real human consequences.

article thumbnail

Why No HTTPS? Here's the World's Largest Websites Not Redirecting Insecure Requests to HTTPS

Troy Hunt

As of today, Google begins shipping Chrome 68 which flags all sites served over the HTTP scheme as being "not secure" This is because the connection is, well, not secure so it seems like a fairly reasonable thing to say! Make sure your site redirects to #HTTPS , so you don’t have the same problem. Cloudflare makes it easy!

article thumbnail

The Legitimisation of Have I Been Pwned

Troy Hunt

Transparency has been a huge part of that effort and I've always written and spoken candidly about my thought processes, how I handle data and very often, the mechanics of how I've built the service (have a scroll through the HIBP tag on this blog for many examples of each). Held at @LancsPolice by @LanpacLtd and presentation by @TITANROCU !

article thumbnail

Microsoft Office Sharepoint Server: a next generation of deeper, wider content silos? | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. million more this year according to Dave Martin, a product manager at EMC during his presentation about fusing Documentum to Sharepoint. (A Back in April, during the San Francisco Web 2.0

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

Similar initiatives were undertaken in Australia, India and Japan, all with the intent to roll these devices out within a relatively short amount of time. And on the other hand, we're saying security, that's a secondary concern. But we all know how security by obscurity works in the end. I'm Robert Vamosi.