With cyber interference in elections going beyond hijacking the ballot box, the Election Commission must prepare to address all potential threats – both domestic and international.
When national security meets the global Internet of Things (IoT), who’s in charge?
Even though the provisions on information security and privacy in India’s 2011 IT rules are rudimentary, they are, more often than not, callously ignored.
India’s remaining competent in both domestic and global markets is hinged on building a society upon the four pillars of technology, institutions, infrastructure and incentives.
Tehran is fostering a start-up industry as a possible motor to solve Iran’s unemployment crisis.
Comments like ‘little girl needs to keep to herself before daddy breaks her face’ get a free pass in the name of free speech.
Facebook should give the public more insight into how content moderation decisions are made.
The content and culture around the game are troubling, but China’s response may be misguided and in fact creating more interest around ‘Blue Whale’.
Though the devastating WannaCry ransomware attack was a failure on the NSA’s part, current UN cyber norms are far too weak to hold any international actor – let alone the US – responsible.
Cyber security researchers have said that they found technical evidence that could link North Korea with the global WannaCry “ransomware” cyber attack.
The underground market for software vulnerabilities has been growing steadily since the 1990s, so the latest WannaCry could be a sign of things to come.
Over the weekend, the ransomware called ‘Wanna Cry’ hit systems in over 100 countries in one of the most widespread cyber attacks in history.
The UK’s National Health Service data is being held to ransom by criminals. This is the mother of all wake-up calls.
He was one of the brilliant mathematical geniuses who helped crack the Nazi codes, but few have ever heard of his name. So who was Bill Tutte?
Asia may have been less effected because it was evening on the continent by the time the virus hit European countries, although the damage remains unknown.
Going as far back as the Bible, and as widely known as the phrase ‘Open, Sesame,’ passwords are a textual link to our past. But they may not be around much longer.
There are as many flaws with the technology as there are with the processes used to secure the EVMs, the laws that create the sanctions and, as always, with the people involved.
About nine GB of data, apparently emails and documents stolen from Macron’s campaign, spread rapidly on Twitter, Facebook and the messaging forum 4chan.
Laws cannot keep pace with technological advances – but that may not be a bad thing.
IT companies have become political targets in the US for taking away American jobs by flying in Indians on temporary visas, a sore point for many.
Facebook has a new, depressingly incompetent strategy for tackling fake news.
Nostalgic Stardew Valley lets Chinese gamers find meaning through chopping wood and growing vegetables, choosing the simple life on the farm over city life.
With climate change leading to increasing disasters, effectively using social media data and other means of discovering the unknown will become crucial.
Is India ready for this high-speed transit system? Or are there cheaper upgrades to the current rail network that would be more sensible?
The costs that Ola and Uber inflict on the financial and physical health of their driver-owners, road space and safety and city transport infrastructure are too significant to be left to Silicon Valley-based venture capitalists.
You can learn a lot about the movement of people and animals if you tap into the tracking data from many of today’s mobile phones.
An unprotected, publicly accessible API endpoint leaks everything from phone numbers to home addresses.
Mangal Singh continues to display the potential to install many of his turbines, which can lead to a useful reduction in greenhouse gas emissions as well as costs.
Historians of South Asia have often examined large technologies but emerging research suggests that small technologies were equally important.
While online taxi companies may simply be reproducing old exploitative structures, the question that seems to have been forgotten is: What kind of public and private transportation system does India want?
Existing satellite capacity can be used for Digital India if the DoT can bypass DoS and ISRO to negotiate with private operators – but is this possible?
Conversations about artificial intelligence must focus on jobs as well as questioning its purpose, values, accountability and governance.
How will the incoming fourth industrial revolution impact society and what clues do tech hubs such as the Bay Area hold for us?
A golden median between an ex-ante and ex-post approach is possible to achieve, if flexibility is at the core of TRAI’s regulatory ethos.
The telecom regulator seeks to resolve the remaining aspects of net neutrality, namely speed and access.
2017 will need to see less of the carrot and more of the stick in order to persuade India’s institutions to prepare against an ever-increasing number of cyber security threats.
Legion discussed potential targets in an interview, including the UIDAI database that holds the Aadhaar data of over 500 million Indians.
With HTTPS, our journalists are assured that the stories they produce will reach their readers in the form they were intended irrespective of how sensitive or controversial their contents are.
Machine translators, however remarkable, are not yet clever enough to anticipate the vast variety of contexts from which meaning emerges.
Most applications in the name of ‘Smart Cities’ and ‘Digital India’ are being made by students with no background in security.