Cybersecurity woes from the mobile apps

Kanika Saxena writes: While public API keys, such as that of Facebook and LinkedIn, are intentionally made available for other apps to verify user identities, most apps use private keys that need to be kept secure, the report explains. Most hackers initiate an attack with credential thefts. To steal the access keys or login credentials, … Continue reading Cybersecurity woes from the mobile apps

The standards war

WSJ news report (Multi author contribution): “Dominance of technical standards underpinning information and communications technologies and other emerging fields is integral to Beijing’s ambitions,” said Congress’s U.S.-China Economic and Security Review Commission in its annual report in December.Standards are gaining urgency as rules are being decided for a new generation of technologies dependent on 5G … Continue reading The standards war