Back

AISHWARYA

Enthusiast Entrepren... • 9m

That makes sense, but since Aadhaar and face recognition involve sensitive biometric data, are there any specific encryption measures or regulatory compliances (like UIDAI guidelines) you follow to ensure user data is not misused or exposed?

1 Reply
Replies (1)

More like this

Recommendations from Medial

Image Description
Image Description

Informative Reads

Hey I am on Medial • 1y

From December 1, Russia Will Collect Biometric Data of International Visitors at Moscow Airports Russia will collect biometric data From 1 December 2024, Russia will collect biometric data at Moscow airports to increase border security. This experi

See More
3 Replies
3

Vasvi Seth

Cyber Security Stude... • 1y

🔒 Protecting Sensitive Personally Identifiable Information (SPII) is paramount in today's digital landscape. SPII encompasses data that requires even stricter handling guidelines to safeguard individuals' privacy and security. As we navigate the co

See More
Reply
5
Image Description

Bharath Varma

 • 

Google • 1y

LARGEST DATABREACH IN INDIA Sensitive data from 815 million Indians surfaced on the dark web, possibly from ICMR's COVID-19 testing records. 'pwn0001,' the hacker, revealed this breach, exposing Aadhaar, passport details, names, phone numbers, and a

See More
1 Reply
5

Devak K

Hey I am on Medial • 4m

Cloud Security Services – DigitDefence Scalable. Secure. Cloud Confidence Starts Here. As your business moves to the cloud, so do the risks. DigitDefence provides advanced cloud security services that protect your infrastructure, apps, and sensitive

See More
Reply
3
Image Description
Image Description

Siddharth K Nair

Thatmoonemojiguy 🌝 • 6m

16 billion passwords leaked in massive breach affecting Apple, Facebook, Google Several collections of login credentials reveal one of the largest data breaches in history, totaling a humongous 16 billion exposed login credentials. The data most lik

See More
13 Replies
15
26

sujit singh

 • 

Dual Infotech Group • 1y

A Blockchain-Based Data Security System for Android and iOS devices ensures the highest level of data protection by leveraging blockchain technology. This system allows users to track their mobile data in real-time, providing alerts if any data is st

See More
Reply
2
Image Description
Image Description

Comet

#freelancer • 1y

The Akira ransomware has been identified as a significant threat to the LATAM airline industry, leveraging sophisticated tactics to encrypt valuable data and demand ransoms. This ransomware operation, active since early 2023, employs a blend of adv

See More
3 Replies
1
8
Image Description
Image Description

Sheikh Ayan

Founder of VistaSec:... • 10m

🚨 Top IoT Vulnerabilities You Need to Know! 🚨 🔹 Weak Passwords & Default Credentials – Many IoT devices ship with default passwords that are easy to guess. 🔹 Unpatched Firmware – Outdated software can have security flaws that hackers exploit. 🔹

See More
4 Replies
7
Image Description
Image Description

Vivek kumar

On medial • 11m

Artificial intelligence models like ChatGPT are designed with safeguards to prevent misuse, but the possibility of using AI for hacking cannot be ruled out. Countries or malicious actors could create AI systems specifically for unethical purposes, su

See More
3 Replies
3
9
Image Description

Raghu

Tech Enthusiast • 1y

Is it really safe for startups to depend on cloud storage? My answer is below 👇🏻 "Cloud storage can be a boon for startups, offering scalability and accessibility. However, it's not without risks. Data breaches, downtime, and compliance issues are

See More
1 Reply
5

Download the medial app to read full posts, comements and news.