In the wake of a growing number of mob lynchings often attributed to fake news spread via WhatsApp, the government is looking for an easy solution. But while some of what it's proposing makes sense, a plan to make messages more traceable would prove impractical.
The Srikrishna Committee's recommendation in its draft of a data protection bill that foreign companies be required to only store domestically certain "critical" data of Indians is impractical and will not help prevent breaches.
But before India enacts a domestic data storage mandate, all the cost implications must be carefully considered. Legislators must study whether the benefits justify the hefty costs involved.
UIDAI again found itself embroiled in a controversy when it was revealed that its helpline was being automatically added in the contact lists of mobile phones. But Google acknowledged that its coding error led to the mishap. Why was Google involved in getting a phone number for UIDAI preloaded on phones?
UIDAI, which administers the Aadhaar program, has some simple advice: Avoid behaviors such as what R.S. Sharma, chairman of the Telecom Regulatory Authority in India, did on Saturday, when he tweeted his Aadhaar number.
Sometimes efforts to prove a system is secure can really backfire. TRAI Chairman R.S. Sharma's attempt to demonstrate Aadhaar security by tweeting his Aadhaar number on Saturday and inviting anyone to attempt to use it to access his personal information reportedly led to data access by ethical hackers.
The Reserve Bank of India issued a notice to all cooperative banks advising them to apply caution while deploying third-party core banking applications and check for appropriate security standards. The move came after credential theft incidents at some banks. But will banks heed the advice?
The government of India's plan to build a cyber-resilient IT infrastructure to improve cybersecurity and mitigate threats from state-sponsored attacks will succeed only if many hurdles are overcome.
As India gears up to use artificial intelligence to boost its defense capabilities and improve security in various sectors, it inevitably will face challenges.
One of the key lessons offered at ISMG's Fraud & Breach Prevention Summit, held June 12-13 in Bengaluru, was the need for security practitioners to have a better perception of threats and risks so they can build successful detection and defense mechanisms.
ISMG's Fraud and Breach Prevention Summit in Bengaluru on June 12 and 13 will offer insights from leading CISOs and other experts on hot topics, including artificial intelligence, endpoint detection and response, blockchain and GDPR compliance.
Facebook has taken several moves aimed at minimizing misuse of social media during the 2019 elections in India. But are the actions merely a marketing maneuver, or could they have a real impact?
The intensive discussion between the Supreme Court and the CEO of UIDAI on recent Aadhaar-related data leaks could result in the court recommending that the Ministry of Law and Justice make amendments to the Aadhaar Act and direct the UIDAI to build a far more robust security framework.
There seems to be no end to the bad news about Indian government website vulnerabilities. What can the government do to better protect citizens' data? For starters, they should promptly pay attention to warnings from local security researchers.
Those concerned about the security of India's Aadhaar biometric ID are pleased that the Supreme Court has ruled that linking Aadhaar numbers to bank accounts, payment cards and mobile phones cannot be mandatory until security issues are adequately addressed.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.