News That Matters

Tag: Security

RBI gets HC poser on credit card security

RBI gets HC poser on credit card security

Finance
NEW DELHI: At a time when the Centre is encouraging people to adopt digital transactions, some banks are allegedly not enforcing RBI directions to provide an additional authentication system for online transactions and the Delhi high court has decided to examine the issue to protect consumers from rising incidents of credit card fraud. Under additional authentication system, banks are supposed to send one-time password (OTP) to the card-holder which is to be used for the transaction and it is meant to ensure that the card is not misused by another person when it is lost. RBI has been asking banks to adopt second level of authentication and has issued several circulars from 2009 to implement it. Alleging that some banks, including HDFC were not providing additional protection layer ...
US military security review amid fitness app fears

US military security review amid fitness app fears

Technology
The US military has said it will review its privacy policy amid concerns that an interactive map released by fitness tracking app Strava could reveal the locations of sensitive military bases.The website and mobile app - which uses GPS from phones and fitness devices such as Fitbit or Garmin to record activity - used the information to create a "global heatmap", which was published on their website in November.Image:Fitness tracking devices now pose a security risk for the militaryThe map raised security concerns about soldiers and other people who are at US military bases in sensitive areas.In response to the Strava data, Pentagon spokeswoman Major Audricia Harris said: "The Department of Defence (DoD) takes matters like these very seriously and is reviewing the situation to determine if ...
How getting remarried can mess up your Social Security

How getting remarried can mess up your Social Security

Finance
You may want to rethink that second walk down the aisle if you are approaching retirement, and counting on income from Social Security.If you're eligible to collect benefits on your ex-spouse's record, you will no longer be eligible for those benefits if you remarry.That rule, plus others, is one of the reasons financial advisors like Stacy Francis, president and CEO of Francis Financial in New York City, sit down with savers to plot out a careful strategy when it comes to claiming Social Security.Knowing these strategies becomes more important with the rise of gray divorce. The divorce rate for adults age 50 and over has nearly doubled in the past 25 years, according to data from the U.S. Census Bureau. To be eligible to claim on your ex-spouse's Social Security benefits, whereby you rece...
UIDAI introduces new two-layer security system to improve Aadhaar privacy

UIDAI introduces new two-layer security system to improve Aadhaar privacy

Finance
To strengthen safety and security of Aadhaar holders, the Unique Identification Authority of India (UIDAI) today introduced new layers of security of Virtual and limited Know Your Customer (KYC) to improve privacy. According to a ET Now report, the authority has introduced virtual ID for Aadhaar holders to use instead of Aadhaar number. Virtual ID will be used to avoid any need to share Aadhaar number at the time of authentication. Virtual ID will be 16 digit randomly-generated virtual number, which will be used for authentication instead of Aadhaar number. It will not be possible to locate your Aadhaar based on your virtual id. All agencies will migrate to the new system by June 1. Besides Virtual ID, the agency has also introduced limited KYC facility. Limited KYC will provid...
AP Explains: Who's affected by computer chip security flaw

AP Explains: Who's affected by computer chip security flaw

Technology
Technology companies are scrambling to fix serious security flaws affecting computer processors built by Intel and other chipmakers and found in many of the world's personal computers and smartphones. The two hardware bugs discovered can be exploited to allow the memory content of a computer to be leaked. Such a leak could potentially expose stored passwords and other sensitive data, including personal photos, emails and instant messages. Researchers at Google's Project Zero and academic institutions including the Graz University of Technology in Austria discovered the problem last year and disclosed it Wednesday. There's no evidence that bad actors have yet exploited the bugs, but companies from Microsoft to Mozilla said this week they have worked to patch up vulnerabilities to their ope...