Rural Indian villages are about to get lifesaving treatment through an app

India has just one doctor for every 1,700 people, and while 70% of the population is in rural areas, about 60% of the healthcare infrastructure is in cities.

http://money.cnn.com/2016/10/03/technology/intelehealth-india-doctor-health-worker-app/index.html

With majority of population being in rural India and very few doctors to take care of them, telemedicine is the way to go. With the advancement of technology like IOT of health, it will not only reduce the cost of treating a patient in rural places, but will also help in diagnosing the disease early with quicker treatment.

 

India, too needs to have a central repository of health information, probably linked with Aadhar (with appropriate security and anonymity), it will help in identifying spread of disease, plagues and with bioinformatics lead to better research and improving healthcare in India.

Cyberbullying increases by 75%

During July, August, and September, the Office of the Children's eSafety Commissioner investigated 70 serious Australia-wide cyberbullying claims, up from 40 in the same period last year.

http://www.zdnet.com/article/childrens-esafety-commissioner-reports-75-percent-increase-in-cyberbullying-complaints/

 

With mobile phones and tablets, it has become easy for kids to access internet. Cyber-bullying mainly happens through Social sites. Many kids under the age of 16, create an accounts on these sites by giving a false birthdate. It is the responsibility of these site owners to ensure that false birthdates are not accepted, if needed to have a separate site for kids under the age of 16. Any account created on these sites have to be validated, thus limiting the posting through genuine accounts and not fake accounts. This will go a long way in preventing cyber-bullying.

GST to boost business in India

Asserting that India has shown that progress on reforms could "ignite" business investment, the IMF today said the adoption of goods and services tax is poised to boost the country's medium-term growth.  

Read more at: http://economictimes.indiatimes.com/articleshow/54727072.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst

 

Looking forward for implementation of GST in India. Manufacturing companies will benefit a lot and will help them to compete with imported products. Various tax leakages will get plugged and will help to lower price which will ultimately help customers. 

GajShield on ‘Net Neutrality’

Ending Net-neutrality will squeeze out start-ups who will have to pay distributors to offer their apps at the same level as the larger player. This will monopolise the service for a few. Internet was developed to provide free and fair access to all. Limiting this will kill innovation and prove to be a major hurdle in the growth of the Indian economy. 

Why the Anthem attack is a wake-up call for CISOs

If you have a large customer base, you're a target

On December 10, 2014, someone sneaked into Anthem Inc.'s database but no one realized it for a while. The data breach was only discovered much later on January 27, 2015, after a database administrator found his credentials being used to run a query which was not started by him. By then, hackers had already accessed millions of customer records which included residential addresses, birthdays, medical identification numbers, social security numbers and even email addresses belonging to employees, and both current and former customers.

Companies managing large customer databases particularly need to step up their security because hackers target such data for financial gain. According to reports, data records form insurers and health care providers in the US currently face about 20,000 to 30,000 hacking attempts every week to access their data.

 

Cyberlaw in India – 2014 roundup

The cyberlaws need to be relooked and improved as more and more Indians are connected. Internet can be used or misused, leaving people vulnerable and often not knowing what to do when a fraud occurs. Internet or phone banking need to be secured further with OTP or two-factor authentication. Authentication is always going to be the weakest link leading to many frauds. Improving or adding further security to authorize a user will improve security and confidence of consumer to use ecommerce more often. Hope, we see added level of security and improved laws to help the every growing internet commerce in India.

The year 2014 was a landmark year in Indian cyberspace and its history. This was the year which demonstrated to the world of how a democracy can harness the power of technology not only for the purposes of ensuring participative governance but also for furthering the cause of democratic values, traditions and norms. The year 2014 was the year of the great Indian elections. These were the first elections in the documented Indian elections history of independent India which were predominantly marked by the use of technology and social media. In fact, social media was used to its hilt to reach out to more and more users in cyberspace and more and more mobile and Internet users for the purposes of engaging them in political discussion and in influencing them to exercise their franchise.

http://blogs.economictimes.indiatimes.com/Cyberlawsintodaystimes/cyberlaw-in-india-2014-roundup/


 

 

 

A Home Ministry official stated that there has been an annual increase of more than 40% in cyber crime cases registered in the country during the past two-three years. He added that India with a fast growing economy is susceptible to international and domestic cyber attacks and there is a need to ensure cyber crime-free environment. - See more at: http://www.digit.in/internet/india-records-a-40-percent-rise-in-cybercrime-24850.html#sthash.3UOBwLCB.dpuf
A Home Ministry official stated that there has been an annual increase of more than 40% in cyber crime cases registered in the country during the past two-three years. He added that India with a fast growing economy is susceptible to international and domestic cyber attacks and there is a need to ensure cyber crime-free environment. - See more at: http://www.digit.in/internet/india-records-a-40-percent-rise-in-cybercrime-24850.html#sthash.3UOBwLCB.dpuf
Apple iPhone 5c sale DhamakaGet upto 39% off on Apple iphone 5c + Free Delivery | Only two days left
Click to know more
Developing Windows Apps for Intel DevicesLearn how to develop Windows app for Intel Device, Download free tools, Learning Guides and many more
Click to know more
India records a 40 percent rise in cybercrime

Hacking, phishing, credit card and banking frauds have increased by 40% in the country in the past two years, according to a government report.

- See more at: http://www.digit.in/internet/india-records-a-40-percent-rise-in-cybercrime-24850.html#sthash.3UOBwLCB.dpu
Apple iPhone 5c sale DhamakaGet upto 39% off on Apple iphone 5c + Free Delivery | Only two days left
Click to know more
Developing Windows Apps for Intel DevicesLearn how to develop Windows app for Intel Device, Download free tools, Learning Guides and many more
Click to know more
India records a 40 percent rise in cybercrime

Hacking, phishing, credit card and banking frauds have increased by 40% in the country in the past two years, according to a government report.

- See more at: http://www.digit.in/internet/india-records-a-40-percent-rise-in-cybercrime-24850.html#sthash.3UOBwLCB.dpuf
Apple iPhone 5c sale DhamakaGet upto 39% off on Apple iphone 5c + Free Delivery | Only two days left
Click to know more
Developing Windows Apps for Intel DevicesLearn how to develop Windows app for Intel Device, Download free tools, Learning Guides and many more
Click to know more
India records a 40 percent rise in cybercrime

Hacking, phishing, credit card and banking frauds have increased by 40% in the country in the past two years, according to a government report.

- See more at: http://www.digit.in/internet/india-records-a-40-percent-rise-in-cybercrime-24850.html#sthash.3UOBwLCB.dpuf

Wake up call

With the recent attack on Sony, followed by an attack on Xbox networks, clearly indicates that security is still not taken seriously by even organisation expected to be leader in their respective industries. It is indeed a wake-up-call for all enterprises who feel that their security is adequate enough. The question that needs to be asked is not who is accessing data but what are they doing with this data. Authentication, though important, is not adequate enough to protect an enterprise. Identity can not longer ensure that data is safe. Real time visibility on how is being used for sent out of the network has become far more important. Context aware security can provide the required visibility and help organisation to protect their data.

 

 

More on IOT Security

Intel shows of its own IOT platform and it looks promisingly secure. Will need to wait and see the actual devices hit the market and whether they are able to leverage the security provided by this platform. One thing for sure, Intel wants to compete headon with Qualcomm, and do not want to be left behind as in the mobile space. This competition will definitely help consumers, whether secure, wait and watch.

Intel staked out a claim in the freewheeling Internet of Things (IoT) market today at an event in San Francisco, where, the chip giant laid out a sweeping plan to ensure its place as a key player shaping the IoT ecosystem.

http://www.tomsitpro.com/articles/intel-iot-security,1-2386.html

 

Is C Still Relevant?

Having started my career with 'C' programming language, I always felt I was biased towards it. Having looked at many other programming languages, including higher languages like Perl, Python, PHP, C++, always felt I missed the joy of 'Segmentation faults' while running my 'C' programs. The memory corruptions, overflows always had a romantic appeal. Current day programming languages have become too mechanical and do not have the emotional touch that 'C' provided. No reason, I used to talk to it while coding. Our code were well commented and looked beautiful. Our thoughts and feelings were expressed through it.

Even in this 21st Century, 'C' is still relevant. It is becoming younger with days. For performance, we always use 'C'. It performs well with limited memory availability of memory in embedded devices. You can argue that because of bad memory allocation and pointers are culprit to many vulnerabilities found in many applications. I would say, that it all boils down to how important you feel security is, which will reflect in your code.

I respect programmers who are able to code well in 'C'. Not only would they understand the concepts of programming, but understand systems better. I always found good programmers of Perl or PHP, weak in system programming. I may be wrong or probably my bias towards 'C' makes me feel so. Newer languages will ome and go, but my love for 'C' will always remain.

Why the Future of Security will be Context-Based ?

Rise in adoption of mobile, social and cloud technologies has created the need for a more proactive and context-based approach to managing security

 

For years, business organizations followed a rather reactive approach to managing IT security. Every time there was a new type of attack, security vendors would come up with a new solution to combat that threat. This approach worked very well till users accessed computers in controlled work environments. The company could easily monitor incoming and outgoing network traffic. But in today’s multi-channel environment, where users stay connected through a plethora of mobile devices and web-based apps, the security threats and vulnerabilities have only increased. According to PWC’s Global Information Security Survey 2015, the number of security incidents detected in 2014 was 48% higher than the previous year.

Multiple access devices and touch points have given hackers more options for entering corporate networks, without being easily detected. Therefore, the traditional models of security management are proving insufficient.  There is a need to adopt a new approach to managing security - one that is more proactive, sensitive and context-based. A recent Gartner report points out that increasing adoption of a more mobile, social, data-driven and consumer-like workplace is causing the breakdown of traditional security models and strategies. Going forward, enterprise security solutions will have to become context aware and adaptive. Security organizations and leaders that fail to alter strategies to accommodate a more consumerized workforce will soon be sidelined, predicts the report.

Are we ready to integrate IOT devices ? Security ?

The hack of Sony Pictures have raised many questions about securing our network and devices.

In a single week, hackers have brought a major Hollywood studio to its knees.

Sony Pictures is dealing with more than downed computers and frozen email. Movies have been leaked, and internal documents have exposed private company memos, along with employees' salaries, Social Security numbers and health information.

http://money.cnn.com/2014/12/04/technology/security/sony-hack/

 We need to first work towards securing our existing infrastructure and data. If we are unable to do so, imagine what happens when we connect these embedded devices are connected to internet. IOT may be rapidly flourishing into our everyday life, whether in cars, power utility, farm etc, but if we do not build these devices with security in mind, it may cause far larger disaster. not only in monetary terms, but in human lives too.