GUEST OPINION: Most of us are familiar with two-factor authentication, or 2FA, as an additional security measure when logging in to various sites such as Google, Apple, Facebook, Microsoft, Amazon, and other popular websites and applications we use every day.
Android malware that sidesteps the measures introduced by Google in March, to restrict the use of SMS and Call Log permissions and thus prevent credential-stealing apps from abusing these permissions and bypassing SMS-based two-factor authentication, has been discovered by Slovakian security firm ESET.
Most cybersecurity is making up for weak platforms. We need to address the fundamentals, design platforms that prevent out-of-bounds access[…]
For most developers the security/performance trade off is still the hardest one to tackle, even as the cost of processing[…]
RISC has been overhyped. While it is an interesting low-level processor architecture, what the world needs is high-level system architectures,[…]
There are two flaws that are widespread in the industry here. The first is that any platform or language should[…]
Ajai Chowdhry, one of the founders and CEO of HCL is married to a cousin of a cousin of mine.[…]