Remove tag accountability
article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

Again, I should say, most abuse is far more mundane that it's just like stock where most abuse is far more mundane, even if it seems technical it's often not particularly technical, but the IoT abuse does happen and it's something that we should be aware of, and I think IoT manufacturers should be aware of. There are legitimate apps for that.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

It's the address on Aadhaar's Twitter account , it's the first result on a Google search and time and time again, it's promoted as the site people should go to before doing anything else Aadhaar related. Why HSTS is here and not (consistently) on the root domain is unclear and unfortunately, it means that someone browsing from uidai.gov.in

Security 111