Remove tag india
article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

Nearly 20 million Cutout.Pro users’ data breached Cutout.Pro, an AI photo and video editing platform, has suffered a data breach. TB Turtlemint Source (New) Insurance India Yes 1,800,000 Chunghwa Telecom Source (New) Telecoms Taiwan Yes 1.7 Data breached: 21,100,000 records. The threat actor, KryptonZambie, listed a 5.93

article thumbnail

Humanitarian Collaboration | ZDNet

Collaboration 2.0

Doctors can now use mobile devices to to tag patient condition and sending, for example, xrays from Africa to India by mobile network to be checked by doctors and diagnosed. Web video showdown: Flash vs. QuickTime vs. Windows Media How do the three major web video formats compare in terms of CPU usage and battery life?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Free Taxonomy & Folksonomy Book | ZDNet

Collaboration 2.0

Web video showdown: Flash vs. QuickTime vs. Windows Media How do the three major web video formats compare in terms of CPU usage and battery life? Privacy Policy | Terms of Use Around the network Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. All rights reserved.

Paper 40
article thumbnail

'ESME': Social messaging within an enterprise SOA environment | ZDNet

Collaboration 2.0

In some ways ESME is more advanced than Twitter since it features user groups and tag clouds, enabling project based contextual messaging. Web video showdown: Flash vs. QuickTime vs. Windows Media How do the three major web video formats compare in terms of CPU usage and battery life? You might be surprised at the results.

Paper 45
article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

India's Aadhaar implementation is the largest biometric system in the world, holding about 1.2 The video within that story reiterates over and over again that "Aadhaar data cannot be breached" It then goes on to quote the government as saying that: it cannot be questioned by a handful of individuals. billion locals' data.

Security 111
article thumbnail

Microsoft Office Sharepoint Server: a next generation of deeper, wider content silos? | ZDNet

Collaboration 2.0

Taxonomies and tagging, threaded discussion, wikis and other ‘Enterprise 2.0 ‘ tools are an alternative solution to the problem of generating mountains of hard to find silo’d information and associated email. Privacy Policy | Terms of Use Around the network Avoiding these pitfalls can prevent a lot of frustration.

article thumbnail

Apple founder Steve Wozniak interview, answers your Tweeted questions | ZDNet

Collaboration 2.0

Weve actually resorted to putting name tags on the inisde of our childrens shirts. Web video showdown: Flash vs. QuickTime vs. Windows Media How do the three major web video formats compare in terms of CPU usage and battery life? Privacy Policy | Terms of Use Around the network which actually work. All rights reserved.