Tag Archive for: Tech2

UIDAI chief responds to concerns over privacy, security and making Aadhaar mandatory for services – Tech2 (blog)


Tech2 (blog)

UIDAI chief responds to concerns over privacy, security and making Aadhaar mandatory for services
Tech2 (blog)
Ajay Bhushan Panday, chief executive of the Unique Identity Authority of India (UIDAI) responded to concerns surrounding privacy of users, data breaches, and Aadhaar being made increasingly mandatory for government services in an exclusive interview …

and more »

data breach – Google News

Yahoo data breach: FBI accuses four individuals, including Russian intelligence agency employees – Tech2


Tech2

Yahoo data breach: FBI accuses four individuals, including Russian intelligence agency employees
Tech2
Attorney General Jeff Sessions, who announced the charges said “Cyber crime poses a significant threat to our nation's security and prosperity, and this is one of the largest data breaches in history. But thanks to the tireless efforts of U.S
U.S. Charges Russian FSB Officers and Their Criminal Conspirators for Hacking Yahoo and Millions of Email Accounts …US Department of Justice
Justice Department charges Russian spies and criminal hackers in Yahoo intrusionWashington Post

all 562 news articles »

data breach – Google News

UK’s armed forces settle on the iPhone 7 because they think it’s more secure than Android – Tech2


Tech2

UK's armed forces settle on the iPhone 7 because they think it's more secure than Android
Tech2
Android vs iPhone debates rage the world over on issues ranging from value for money and customisability to flexibility and security. For the armed forces of the world, however, security is everything and so far, it looks like the iPhone is turning out

and more »

android security – read more

All you need to know about Android Master Key vulnerability – Tech2


Tech2

All you need to know about Android Master Key vulnerability
Tech2
In its most evil form, however, a botnet can be used to conduct Distributed Denial of Service (DDoS) attacks. Since smartphones and tablets running Android have high user involvement, it becomes that much more dangerous when they are part of a botnet 
First malware in the wild found exploiting Bluebox's Android app signing flawApple Insider
Malware Using Android "Master Key" Flaw Found In the WildDecryptedTech

all 95 news articles »

android botnet – read more