• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Iran announced to have foiled a second cyber-attack in a week
  • Largest hospital system in New Jersey was hit by ransomware attack
  • Security Affairs newsletter Round 244
  • A malvertising campaign targets iPhone users with Krampus-3PC
  • Rooster Teeth Productions suffered a payment card breach
  • New Orleans hit by ransomware, US cities continues to be under attack
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Posts tagged "Aadhaar"

Aadhaar

Data breach of the Aadhaar biometric system poses a serious risk for 1 Billion Indian residents

The Tribune announced to have “purchased” a service that provided...

January 5, 2018  By Pierluigi Paganini

According to UIDAI, more than 200 government websites made Aadhaar system users’ details public

According to the Unique Identification Authority of India (UIDAI),...

November 20, 2017  By Pierluigi Paganini

Information Security Practices of Aadhaar – 135 Million Indian government payment card details leaked

A CIS study estimated number of Aadhaar numbers leaked through 4 gov portals...

May 3, 2017  By Pierluigi Paganini

Technical issue at the Jharkhand govt website caused the exposure of more than 1.4 million Aadhaar numbers

Personal information associated with more than a million Aadhaar numbers...

April 24, 2017  By Pierluigi Paganini




Copyright 2015 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Necessary Always Enabled