The Unique Identification Authority of India (UIDAI) issued a gazette notification on Thursday that mandates private organisations using Aadhaar services to pay Rs 20 for each customer verification and 50 paise for authentication of the unique ID. The gazette notification, the Aadhaar (Pricing of Aadhaar Authentication Services) Regulations 2019, however, exempts government entities and the […]
Archives for March 2019
Coverfox hits the market to raise $50M in new financing round
Glitterbug Technologies, which owns and operates insurance aggregator Coverfox, has hit the market to raise a fresh round of equity financing, estimated at $50 million (Rs 350.23 crore). The Mumbai-headquartered company is in talks with several potential investors, particularly from China, the US and the UK, according to sources, briefed on the developments, indicating that […]
Untangle Intros SD-WAN Router in New Security Framework
News Untangle Intros SD-WAN Router in New Security Framework By David Ramel 03/07/2019 Network security firm Untangle announced a new security framework that leverages new-age technologies such as software-defined wide-area networking (SD-WAN) for its approach to provide security orchestration across the enterprise. The Untangle Network Security Framework is designed to provide protection, monitoring and control […]
RSA Conference 2019: Firms Continue to Fail at IoT Security
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
RSAC 2019: For Domestic Abuse, IoT Devices Pose New Threat
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Patched Chrome exploit worked hand-in-hand with critical Windows bug
Google has revealed the ‘highly severe’ Chrome flaw patched last Friday was being actively exploited in conjunction with a Windows 7 vulnerability that has still not been fixed. The first flaw, found in Chrome and dubbed CVE-2019-5786, was a use-after-free memory mismanagement error that was being actively exploited in the wild to pull off remote […]
Google fixes ‘highly severe’ zero-day Chrome exploit
Google has confirmed that a Chrome browser patch released last week was a fix for a critical flaw that was being exploited by criminals to inject malware onto a user’s device. The company is urging Chrome users to immediately update their web browsers to the latest version, released last week, in light of the discovery of […]
Microsoft-backed Affle acquires Singapore based online-to-offline platform Shoffr
Microsoft-backed consumer intelligence company Affle has acquired Singapore based online-to-offline (O2O) platform Shoffr in a cash-and-stock deal. The acquisition includes the business, brand name, intellectual property rights, business relationships, assets and employees of Shoffr, people in the know, said. The deal is effective February, one of them said. Financial terms weren’t available. Affle India and […]
Microsoft-backed Affle acquires Singapore based online-to-offline platform Shoffr
Microsoft-backed consumer intelligence company Affle has acquired Singapore based online-to-offline (O2O) platform Shoffr in a cash-and-stock deal. The acquisition includes the business, brand name, intellectual property rights, business relationships, assets and employees of Shoffr, people in the know, said. The deal is effective February, one of them said. Financial terms weren’t available. Affle India and […]
How blockchain will manage networks
Ethernet networking technology is flawed, say some engineers. The problem is it doesn’t have any inherent security built in to it. Ethernet also hard to manage because it’s centralized. It’s out-of-date, and it needs revamping, researchers say. One attempt to address the issue is the Marconi protocol, which is a strategy to shift network and […]