GUEST OPINION: Cybercriminals tend to follow the path of least risk and resistance with Application Programming Interface (API) security creating a window of opportunity for a cyber attack with a low barrier to entry. It’s a problem that has existed for years and is currently spiralling out of control.
India's ambitious bid to collect the biometric details of its 1.3 billion people within a giant database - known as Aadhaar - appears to have gone off the rails, with reports that the software used has been compromised through use of a patch that disables a number of security features in the program used to enrol new users.
The semi-government organisation which manages India's massive Aadhaar database has threatened to take legal action against the technology website ZDNet over a report that claimed a new leak had hit the national ID database.
Indian authorities have asked the police to investigate The Tribune newspaper and one of its reporters after the publication of a report that claimed personal details of Indian citizens, submitted to the country's Aadhaar authority, were being sold cheaply online.
About 135 million Aadhaar numbers and 100 million bank account numbers could have leaked from official portals that handle government pension and rural employment in India.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]