Digital ID

With Less Than 1 Year To Go Companies Place Different Priorities on GDPR Compliance

The European General Data Protection Regulation (GDPR) will take effect in one year from now, but a large number of…

9 years ago

Hackers demonstrated that it is too easy to bypass the Samsung S8 iris scanner.

Hackers demonstrated that it is very easy to bypass the Samsung S8 iris scanner by using a camera, a printer,…

9 years ago

Conexant audio driver works as Built-in Keylogger feature in dozens HP devices

A Security researcher discovered that a Conexant audio driver shipped dozens HP laptops and tablet PCs logs keystrokes. Security researcher…

9 years ago

UK Government’s secret programme for mass surveillance on internet and phones leaked

According to a draft document leaked online, UK Government is assigning itself more powers to spy on live communications and…

9 years ago

Information Security Practices of Aadhaar – 135 Million Indian government payment card details leaked

A CIS study estimated number of Aadhaar numbers leaked through 4 gov portals could be around 135 million and 100M…

9 years ago

Turkey banned Wikipedia because its content web contents that represents a threat to national security

The monitoring group Turkey Blocks confirmed that Turkey banned Wikipedia because its content web content that represents a threat to…

9 years ago

Four Essential Security & Privacy Extensions for Chrome

Here are the top four extensions for the Chrome browser to keep your online activity safe, secure and private. The…

9 years ago

Technical issue at the Jharkhand govt website caused the exposure of more than 1.4 million Aadhaar numbers

Personal information associated with more than a million Aadhaar numbers published on Jharkhand govt website due to a technical problem.…

9 years ago

What Is Metadata Retention, And How Do You Maintain Your Privacy?

As Australia's newly approved Data Retention law comes into effect, how does the law actually affect the average coutry internet…

9 years ago

Exfiltrating data from laptop and smartphones via ambient light sensors

A security researcher presented a method to exfiltrate sensitive data from a laptop or a smartphone through built-in ambient light…

9 years ago

This website uses cookies.