<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="http://editors.cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>http://editors.cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 3441 to 3455.
        
  </description>
  
  
  
  
  <image rdf:resource="http://editors.cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/hans.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/hans-varghese-mathews"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Hans.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Handcuffs.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/hakon-2016"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/times-of-india-india-times-december-13-2012-kim-arora-hacktivists-deface-bsnl-website"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Hackschools.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/hacking-modding-making"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/hacking.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/news/hackers-take-protest-to-indian-streets-and-cyberspace"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/hackers.jpg"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/the-times-of-india-may-19-2017-kim-arora-and-digbijay-mishra-hacker-steals-17-million-zomato-users-data-briefly-puts-it-on-dark-web"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/home-images/Hackathon.png"/>
        
        
            <rdf:li rdf:resource="http://editors.cis-india.org/internet-governance/news/business-standard-alnoor-peermohamed-may-19-2017-hack-exposes-zomatos-weak-protection-of-customer-data-say-cyber-experts"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="http://editors.cis-india.org/home-images/hans.jpg">
    <title>Hans Verghese Mathews</title>
    <link>http://editors.cis-india.org/home-images/hans.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/hans.jpg'&gt;http://editors.cis-india.org/home-images/hans.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-04-28T09:18:57Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/hans-varghese-mathews">
    <title>Hans Varghese Mathews</title>
    <link>http://editors.cis-india.org/internet-governance/hans-varghese-mathews</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Hans Varghese Mathews&lt;/b&gt; read philosophy as an undergraduate, at the &lt;a class="external-link" href="http://www.usc.edu/"&gt;University of Southern California&lt;/a&gt;,   studying logic and aesthetics; and went on to obtain a doctorate in   mathematics, from the University of Wisconsin, studying algebraic   topology primarily, with mathematical logic and philosophy as subsidiary   subjects. He has been a research associate with the &lt;a class="external-link" href="http://www.isical.ac.in/"&gt;Indian Statistical Institute&lt;/a&gt;, and has written extensively on visual art for &lt;a class="external-link" href="http://www.frontlineonnet.com/"&gt;Frontline&lt;/a&gt;;  he currently directs mathematical modelling for an analytics firm.  He  has an abiding interest in the formal understanding of painting and   poetry; and a more recent and dominating interest in the mathematization   of the social sciences.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/hans-varghese-mathews'&gt;http://editors.cis-india.org/internet-governance/hans-varghese-mathews&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2014-10-23T06:50:13Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Hans.jpg">
    <title>Hans Foundation</title>
    <link>http://editors.cis-india.org/home-images/Hans.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Hans.jpg'&gt;http://editors.cis-india.org/home-images/Hans.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-07-19T05:17:14Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Handcuffs.png">
    <title>Handcuffs</title>
    <link>http://editors.cis-india.org/home-images/Handcuffs.png</link>
    <description>
        &lt;b&gt;Handcuffs&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Handcuffs.png'&gt;http://editors.cis-india.org/home-images/Handcuffs.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-08-22T00:41:33Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/hakon-2016">
    <title>Hakon 2016</title>
    <link>http://editors.cis-india.org/internet-governance/news/hakon-2016</link>
    <description>
        &lt;b&gt; Udbhav Tiwari attended attended Hakon 2016, a conference held between September 30 and October 2, 2016 at Indore, Madhya Pradesh, India,on behalf of CIS under the Hewlett Cyber Security Project. &lt;/b&gt;
        &lt;p dir="ltr" style="text-align: justify; "&gt;Hakon 2016 was the third edition of the conference which  has been organised by Ninja Information Security Systems, an ISO  27001:2013 &amp;amp; 9001:2008 certified training organisation and the  primary sponsor of the conference from Indore. The conference was  efficiently organised, had about 150 to  200 people attending overall  and provided an unique window into the non-tech hub/big city ethical  hacker ecosystem and their place within the cyber security setup in  India. The agenda of this year's conference was the Underground Digital  Black Market &amp;amp; Digital Terrorism, with a fair mix of participants  from the industry, academia and the government. The conference website  can be looked up at &lt;a href="http://www.hakonindia.org/"&gt;http://www.hakonindia.org/&lt;/a&gt; for further details, including a look at past editions of the conference.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The technical workshops held during the first two days of the conference were well organised and networking with the teachers during and mostly at the end of the conference was very helpful in understanding a practitioners perspective on cutting edge aspects of cyber security. This was particularly true for &lt;a class="external-link" href="http://www.chuckeasttom.com/"&gt;Chuck Easttom Williams&lt;/a&gt;, an accomplished cyber security expert from the USA who regularly trains government agencies and in a fairly reputed industry veteran who has been an invited speaker at DEFCON and even has a couple of patents to his name.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/hakon-2016'&gt;http://editors.cis-india.org/internet-governance/news/hakon-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-10-15T10:04:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/times-of-india-india-times-december-13-2012-kim-arora-hacktivists-deface-bsnl-website">
    <title>Hacktivists deface BSNL website</title>
    <link>http://editors.cis-india.org/news/times-of-india-india-times-december-13-2012-kim-arora-hacktivists-deface-bsnl-website</link>
    <description>
        &lt;b&gt;The Bharat Sanchar Nigam Limited (BSNL) website, www.bsnl.co.in, was hacked and defaced on Thursday afternoon.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Kim Arora was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/telecom/Hacktivists-deface-BSNL-website/articleshow/17603936.cms"&gt;published&lt;/a&gt; in the Times of India on December 13, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A message on the home page said the attack was carried out by the hacktivist group, Anonymous India, as a protest against section 66 A of the &lt;a href="http://timesofindia.indiatimes.com/topic/IT-Act"&gt;IT Act&lt;/a&gt; and in support of cartoonist Aseem Trivedi, on an indefinite hunger strike at Jantar Mantar since Dec 8 for the same. The website was restored around 7 pm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Trivedi said he had received a call from Anonymous around 1.30 in the afternoon informing him that the website has been defaced. On being asked if such a form of protest was valid, Trivedi said, "When the government doesn't pay heed to people's protests against its laws and arrests innocent people for Facebook posts, then such a protest is absolutely valid."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For most of the afternoon and early evening, the BSNL website wasn't available directly. A cached version of the BSNL home page showed an image of cartoonist Trivedi with text that read "Hacked by Anonymous India. support &lt;a href="http://timesofindia.indiatimes.com/topic/Aseem-trivedi"&gt;Aseem trivedi&lt;/a&gt; (cartoonist) and alok dixit on the hunger strike. remove IT Act 66a databases of all 250 bsnl site has been d Hacked by Anonymous India (sic)". While this message was repeated over and over on the page, it ended with the line "Proof are (sic) here" followed by a link to a page containing the passwords to BSNL databases. BSNL officials were unaware of the attack until Thursday evening.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Late in the evening,  Anonymous India tweeted from their account @opindia_revenge: "BSNL  Websites hacked, passwords and database leaked... Anonymous India  demands withdrawal of Sec 66A of IT Act." &lt;br /&gt;&lt;br /&gt; In an open letter to  the Government of India posted on alternate media website Kafila in June  this year, Anonymous had explained they only carried out  &lt;a href="http://timesofindia.indiatimes.com/topic/Distributed-Denial-of-Service"&gt;Distributed Denial of Service&lt;/a&gt; (DDoS) attacks on Indian government websites, which is different from the act of hacking per se.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Contrary views too exist. Sunil Abraham, executive director,  &lt;a href="http://timesofindia.indiatimes.com/topic/Centre-for-Internet-and-Society"&gt;Centre for Internet and Society&lt;/a&gt;,  says the attack was unwarranted. "Speech regulation in India is not a  lost cause, the Minister is holding consultations, MPs are raising the  issue in Parliament, courts have been approached and there is massive  public outcry on social media. Therefore I would request Anonymous India  to desist from defacing websites," said Abraham. A group of MPs,  including Baijayant Jay Panda from Odisha, are scheduled to present a  motion in Parliament on Friday morning for the amendment of section 66A  of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last month, two young girls were arrested in  Palghar, Maharashtra, for criticizing on Facebook the bandh that  followed the death of Shiv Sena supremo Balasaheb Thackeray. Before  that, Karti Chidambaram, son of finance minister P Chidambaram, took a  man to court for commenting on his financial assets on Twitter. In both  cases, the complainant 'used' section 66 A of the IT Act. The section  and the Act have since come in for wide debate regarding freedom of  speech.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/times-of-india-india-times-december-13-2012-kim-arora-hacktivists-deface-bsnl-website'&gt;http://editors.cis-india.org/news/times-of-india-india-times-december-13-2012-kim-arora-hacktivists-deface-bsnl-website&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-12-14T05:20:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Hackschools.jpg">
    <title>Hackschools</title>
    <link>http://editors.cis-india.org/home-images/Hackschools.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Hackschools.jpg'&gt;http://editors.cis-india.org/home-images/Hackschools.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2010-09-07T12:04:43Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/hacking-modding-making">
    <title>Hacking, Modding &amp; Making</title>
    <link>http://editors.cis-india.org/news/hacking-modding-making</link>
    <description>
        &lt;b&gt;Seeber's electronics laboratory is a room in a unit he shares with his mother. Every available space is taken up with teetering towers of electronic parts, writes Brendan Shanahan for GQ.&lt;/b&gt;
        
&lt;p&gt;Like subprime lending or the line at the motor registry, patent and copyright laws control all our lives but no one really understands them. In the world of DIY Tech, however, it is not a subject that can be ignored.&lt;/p&gt;
&lt;p&gt;" If they are infringing on patents then it's a question you have to ask within the individual jurisdiction," says Abraham. "In many jurisdictions design many not have protection. Whether it's legal or illegal is an open question."&lt;/p&gt;
&lt;p&gt;At its heart Abraham's argument is pragmatic: the developing world, especially China, is too big to stop. Companies can fight patent wars in every world territory, hire private detectives, pressure governments and prosecute consumers who buy rip-off products, but, ultimately, they won't win. The genie is out of the bottle.&lt;/p&gt;
&lt;p&gt;"If something has been made technologically possible, we cannot make it illegal and hope that everyone will now pretend that this is no longer technologically possible," says Abraham. "We can't have the government checking everyone's iPod and laptop. The better move is to change the model."&lt;/p&gt;
&lt;p&gt;Abraham has many suggestions for making copyright law more flexible to benefit manufacturers and consumers. One thing is certain: in a world in which Amazon, not even five years after the launch of the Kindle, is now selling more e-books than all hard copy books combined, and technology such as 3D printing will soon be standard, it would be unwise to cling to old certainities. The music industry may come to be regarded as merely the canary in a digital coalmine of failed industries.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.brendanshanahan.net/wp-content/uploads/2012/04/modding-31.jpg"&gt;Read the full post here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/hacking-modding-making'&gt;http://editors.cis-india.org/news/hacking-modding-making&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Patents</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2012-04-09T09:51:41Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked">
    <title>Hacking of SIM card by spy agencies raises fears of sensitive documents being leaked</title>
    <link>http://editors.cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked</link>
    <description>
        &lt;b&gt;The hacking of SIM-card and digital security services provider Gemalto by American and British spy agencies has raised fears that sensitive communications, by the Indian government and hundreds of domestic companies, may have been at the risk of being spied on.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by PK Jayadevan and Neha Alawadhi was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2015-02-25/news/59499696_1_gemalto-encryption-keys-security-solutions"&gt;published in the Economic Times&lt;/a&gt; on February 25, 2015. Pranesh Prakash and Sunil Abraham were quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Netherlands-based Gemalto was jointly hacked by the &lt;a href="http://economictimes.indiatimes.com/topic/US%20National%20Security%20Agency"&gt;US National Security Agency&lt;/a&gt; and Britain's Government Communications Headquarters, and encryption  keys were stolen to monitor mobile communications, according to a news  report published last week.&lt;/p&gt;
&lt;div class="mod-articletext mod-economictimesarticletext mod-economictimesarticletextwithadcpc" id="mod-a-body-after-first-para" style="text-align: justify; "&gt;
&lt;p&gt;India's largest telecom vendors including Airtel, Vodafone and &lt;a href="http://economictimes.indiatimes.com/topic/Idea%20Cellular"&gt;Idea Cellular&lt;/a&gt; use SIM cards supplied by Gemalto, the world's biggest maker of  mobile-phone chips and provider of secure devices such as smart cards  and tokens. &lt;a href="http://economictimes.indiatimes.com/topic/Online%20publisher"&gt;Online publisher&lt;/a&gt; The Intercept in its report named Idea Cellular as one of the networks from which the spy agencies accessed encryption keys.&lt;/p&gt;
&lt;p&gt;"Phone calls and text messages by military, government, diplomats, spy  corporations and by ordinary citizen of India - all of those get  affected by this hack," said Pranesh Prakash, Policy Director at  research and advocacy firm &lt;a href="http://economictimes.indiatimes.com/topic/Centre%20for%20Internet"&gt;Centre for Internet&lt;/a&gt; and Society.&lt;/p&gt;
&lt;p&gt;The Intercept, which accessed top secret documents provided by NSA whistleblower &lt;a href="http://economictimes.indiatimes.com/topic/Edward%20Snowden"&gt;Edward Snowden&lt;/a&gt;,  said American and British spies dug into the private communications of  Gemalto engineers and other employees to steal encryption keys.&lt;/p&gt;
&lt;p&gt;Gemalto provides security services such as two-factor authentication and  access management, and has hundreds of clients in India. The company in  2012 said it provided 25 million e-driver's licences and vehicle  registration certificates in India that let the government "consolidate  driver and vehicle registration information across the population in a  central repository".&lt;/p&gt;
&lt;p&gt;"We believe that the biggest risk stands for  the large number of Vodafone users in the country as the company has  deployed Gemalto's Near Field Communication services solutions to  provide secure and convenient 'wave and pay' contactless transactions  via mobile phone," said Sanchit Vir Gogia, Chief Analyst and Group CEO,  Greyhound Research.&lt;/p&gt;
&lt;p&gt;"We have no further details of these  allegations, which are industry-wide in nature and are not focused on  any one mobile operator. We will support industry bodies and Gemalto in  their investigations," said a Vodafone spokesperson in an email  response.&lt;/p&gt;
&lt;p&gt;Emails to Idea and &lt;a href="http://economictimes.indiatimes.com/topic/Airtel"&gt;Airtel&lt;/a&gt; were unanswered till the time of going to Press.&lt;/p&gt;
&lt;p&gt;"Indian operators typically go for cheaper Chinese vendors that are  anyway low on security. Among the European SIM vendors, Gemalto has the  largest share in India," said a senior mobile services executive,  requesting anonymity.&lt;/p&gt;
&lt;p&gt;The report on the hack comes at a time when Gemalto was looking to tap the &lt;a href="http://economictimes.indiatimes.com/topic/Indian%20market"&gt;Indian market&lt;/a&gt;,  including e-governance initiatives. The company in a recent email to ET  said it had plans to expand its center of excellence in India to  develop multiple products, offer tech support and provide security  solutions for the domestic market.&lt;/p&gt;
&lt;p&gt;"We take this (breach) very  seriously and will devote all resources necessary to fully investigate  and understand the scope of such highly sophisticated attacks to obtain  SIM card data," a Gemalto spokesperson said. "The target was not  Gemalto, per se - it was an attempt to try and cast the widest net  possible to reach as many mobile phones as possible."&lt;/p&gt;
&lt;p&gt;Initial  investigations indicate that SIM products as well as banking cards,  passports and other products and platforms are secure, the company said.  Gemalto is expected to announce the results of its investigation on  Wednesday. British and US spy agencies have been under fire for hacking  and spying on citizens after Snowden in mid-2013 began leaking documents  that revealed massive surveillance programmes by the two governments.  At the time, the Indian government said the NSA was only collecting  meta-data and had no access to the actual contents of phone calls or  text messages.&lt;/p&gt;
&lt;div class="mod-articletext mod-economictimesarticletext mod-economictimesarticletextwithadcpc" id="mod-a-body-after-second-para"&gt;
&lt;p&gt;Experts suggest a multinational consensus or treaty that strikes a balance between national security concerns and privacy.&lt;/p&gt;
&lt;p&gt;"Governments will have to debate this in the United Nations and some  kind of rules for surveillance, maybe treaties, are relevant in the  future," said Kamlesh Bajaj, Chief Executive at Data Security Council of  India. "They shall have to have some kind of a limit to surveillance.  They can't be vacuuming all data in the name of finding a needle in the  haystack."&lt;/p&gt;
&lt;p&gt;Sunil Abraham, Executive Director at Center for  Internet and Society, suggested the Indian government should replace  proprietary operating systems and Android on phones with pure free  software projects, use of virtual private network on phones to  carry voice and data traffic, and encrypt voice and data payloads  separately.&lt;/p&gt;
&lt;p&gt;"When it comes to all the other services provided by  Gemalto, the India government should insist that they will do key  management on their own. This will also mitigate the compromise of  Gemalto's enterprise networks by the NSA," he said.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked'&gt;http://editors.cis-india.org/internet-governance/news/economic-times-jayadevan-pk-neha-alawadhi-february-25-2015-hacking-of-sim-card-by-spy-agencies-raises-fears-of-sensitive-documents-being-leaked&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-09T01:31:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/hacking.jpg">
    <title>Hacking</title>
    <link>http://editors.cis-india.org/home-images/hacking.jpg</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/hacking.jpg'&gt;http://editors.cis-india.org/home-images/hacking.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-04-25T09:09:20Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/news/hackers-take-protest-to-indian-streets-and-cyberspace">
    <title>Hackers Take Protest to Indian Streets and Cyberspace</title>
    <link>http://editors.cis-india.org/news/hackers-take-protest-to-indian-streets-and-cyberspace</link>
    <description>
        &lt;b&gt;First there was self-styled Gandhian activist Anna Hazare who took to the streets to protest corruption. Now a group agitating against censorship on the Internet has arrived in India.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2012/06/08/hackers-take-protest-to-indian-streets-and-cyberspace/"&gt;This article by Shreya Shah was published in the Wall Street Journal on June 8, 2012&amp;nbsp; &lt;/a&gt;Pranesh Prakash is quoted in this article.&lt;/p&gt;
&lt;p&gt;Only this time, the location is cyberspace and their modus operandi hacking.&lt;/p&gt;
&lt;p&gt;In the last few months, Anonymous –a group of hackers, or hacktivists as they like to call themselves –has gone after Web sites of political parties, government sites and Internet service providers, &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/article3496968.ece"&gt;the latest being MTNL&lt;/a&gt;, to protest censorship on the Internet.&lt;/p&gt;
&lt;p&gt;The group says they are opposing laws including the 2008 Information Technology (Amendment) Act and the Information Technology (Intermediaries Guidelines) Rules of 2011, which they say unfairly restrict Internet freedom.&lt;/p&gt;
&lt;p&gt;On Saturday, the hackers will take their protest to the streets, with an Occupy Wall Street-style march called ”Operation Occupy India” planned in 17 cities including Mumbai, Delhi, Indore in Madhya Pradesh, Nagpur in Maharashtra and Kundapur in Karnataka. The group has requested all protestors to wear Guy Fawkes masks, the symbol of Anonymous.&lt;/p&gt;
&lt;p&gt;“This time the common man wants to help us,” an “anon,” which is what members of the group call themselves, told India Real Time.&lt;/p&gt;
&lt;p&gt;Anonymous, which has a global presence, catapulted to fame with its &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052748704457604576011873881591338.html"&gt;attacks on Visa, Mastercard and Paypal&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;This is how the group attacks Web sites: It overwhelms them with thousands of requests from different computer systems simultaneously. The Web site is unable to handle the load and crashes.&lt;/p&gt;
&lt;p&gt;The group intensified its attacks after Internet Service Providers like Reliance, MTNL and Airtel temporarily &lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2012/05/18/vimeo-ban-more-web-censorship/"&gt;blocked file sharing sites like Vimeo&lt;/a&gt;, Dailymotion, Patebin and Pirate bay, citing a Court order.&lt;/p&gt;
&lt;p&gt;But many question the method used by Anonymous.&lt;/p&gt;
&lt;p&gt;“I don’t believe in defacing or hacking government Web sites to prove a point,” says Ankit Fadia, a cyber security expert. “You can’t hold the government ransom,” he adds.&lt;/p&gt;
&lt;p&gt;In an &lt;a class="external-link" href="http://opindia.posterous.com/open-letter-from-anonymous-to-government-of-i"&gt;open letter&lt;/a&gt; to the government, Anonymous India defended its actions. It wrote that traditional ways of protesting are losing meaning and this is a new method to pressure the politicians.&lt;/p&gt;
&lt;p&gt;Members of the group say that like a regular protest on the street, they too block the infrastructure of their opponents. Except in this case, the infrastructure is located in cyberspace.&lt;/p&gt;
&lt;p&gt;This is a “geek method of attacking,” said the anon who spoke to India Real Time. The group does not plan to attacks sites like that of the Indian railways, for instance, which is used by the masses, he explained.&lt;/p&gt;
&lt;p&gt;But not everyone is convinced.&lt;/p&gt;
&lt;p&gt;The group attacked the Web site of India’s Supreme Court even when it says it does not attack Web sites used by the common man, says Pranesh Prakash, Program Director of the Center for Internet and Society.&lt;/p&gt;
&lt;p&gt;The IT Act is another reason Anonymous is protesting. The Act gives the government the power to remove content it finds offensive. The government can also restrict public access to a Web site.&lt;/p&gt;
&lt;p&gt;Anonymous is also protesting the &lt;a class="external-link" href="http://www.mit.gov.in/sites/upload_files/dit/files/GSR314E_10511%281%29.pdf"&gt;Intermediary Guidelines of 2011&lt;/a&gt;. According to this Act, a site that hosts offensive content will have to remove it within 36 hours of a complaint against it.&lt;/p&gt;
&lt;p&gt;As a result, Web sites like Google and Facebook are &lt;a class="external-link" href="http://online.wsj.com/article/SB10001424052702304746604577381791461076660.html%20%20%E2%80%9CThis%20government%20does%20not%20stand%20for%20censorship;%20this%20government%20does%20not%20stand%20for%20infringement%20of%20fr"&gt;facing criminal cases&lt;/a&gt; for hosting objectionable content on their site.&lt;/p&gt;
&lt;p&gt;“This government does not stand for censorship; this government does not stand for infringement of free speech. Indeed, this government does not stand for regulation of free speech,” Kapil Sibal, the Communications and Information Technology Minister told the Rajya Sabha, or the upper house of the Indian Parliament, last month.&lt;/p&gt;
&lt;p&gt;Pranesh Prakash, of the Center for Internet and Society told India Real Time that he does not believe that Anonymous will influence policy makers. He says that the main aim of a protest is to get media attention, and in turn get the attention of the people.&lt;/p&gt;
&lt;p&gt;But he agrees that India’s cyber laws are “hopelessly flawed” and create a framework by which not only the government but &lt;a class="external-link" href="http://kafila.org/2012/01/11/invisible-censorship-how-the-government-censors-without-being-seen-pranesh-prakash/"&gt;everyone can censor&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;He adds, “The laws are a greater threat than Anonymous.”&lt;/p&gt;
&lt;p&gt;Photo Source: Joel Saget/Agence France-Presse/Getty Images&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/news/hackers-take-protest-to-indian-streets-and-cyberspace'&gt;http://editors.cis-india.org/news/hackers-take-protest-to-indian-streets-and-cyberspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2012-06-18T04:02:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/hackers.jpg">
    <title>Hackers</title>
    <link>http://editors.cis-india.org/home-images/hackers.jpg</link>
    <description>
        &lt;b&gt;Hackers use their technology skills to make public interventions to resolve a crisis in their environments.&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/hackers.jpg'&gt;http://editors.cis-india.org/home-images/hackers.jpg&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-04-25T09:07:03Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/the-times-of-india-may-19-2017-kim-arora-and-digbijay-mishra-hacker-steals-17-million-zomato-users-data-briefly-puts-it-on-dark-web">
    <title>Hacker steals 17 million Zomato users’ data, briefly puts it on dark web</title>
    <link>http://editors.cis-india.org/internet-governance/news/the-times-of-india-may-19-2017-kim-arora-and-digbijay-mishra-hacker-steals-17-million-zomato-users-data-briefly-puts-it-on-dark-web</link>
    <description>
        &lt;b&gt;Records of 17 million users were stolen from online restaurant search platform Zomato, the company said in a blog post on Thursday.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Kim Arora and Digbijay Mishra with inputs from Ranjani Ayyar in Chenna was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/hacker-steals-17-million-zomato-users-data-briefly-puts-it-on-dark-web/articleshow/58742129.cms"&gt;published in the Times of India&lt;/a&gt; on May 19, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;According to information security blog and news website &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/HackRead"&gt;HackRead&lt;/a&gt;,  the data was being peddled online on the "dark web" for about $1,000.  The company, also a food delivery platform, advised users to change  passwords. However, late on Thursday night, &lt;a class="key_underline" href="http://timesofindia.indiatimes.com/topic/Zomato"&gt;Zomato&lt;/a&gt; claimed it had contacted the hacker and persuaded him/her to not only  destroy all copies of the data, but also to take the database off the  dark web marketplace. The company said it will post an update on how the  breach happened once they "close the loopholes".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an official blog updated with this information, Zomato said, "The hacker has been very cooperative with us. He/she wanted us to acknowledge security vulnerabilities in our system and work with the ethical hacker community to plug the gaps. His/her key request was that we run a healthy bug bounty program for security researchers." Bug bounties are a standard program among tech companies, where they reward outsiders to highlight bugs and flaws in their software systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The number of user accounts compromised was pegged at 17 million earlier in the day. In the late night update, Zomato said password hashes (passwords in a scrambled, encrypted form) of 6.6 million users was compromised. It wasn't immediately clear whether this 6.6 million was part of the 17 million records stolen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zomato tried assuring users that payment information was safe. "Please note that only 5 data points were exposed - user IDs, names, usernames, email addresses, and password hashes with salt- that is, passwords that were encrypted and would be unintelligible. No other information was exposed to anyone (we have a copy of the 'leaked' database with us). Your payment information is absolutely safe, and there's no need to panic," said the late night update.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the information security community raised concerns over the technique used for "hashing" or encrypting the passwords. A screenshot of the vendor's sale page for stolen data posted on HackRead identifies the hashing algorithm as "MD5", which experts say is "outdated" and "insecure". The research team at infySEC -- a cyber security company from Chennai -- tried to access user information in Zomato's database, as part of its bug bounty program. "We were able to access user names, email IDs, addresses and history of transactions. We highlighted this to Zomato but we have not heard from them," said Karthick Vigneshwar, director, infySEC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Zomato joins a long list of tech-enabled businesses that have recently had user data stolen. Such data can ostensibly be used by malicious actors to send phishing mails, or even by hackers to carry out cyber attacks. In February 2017, content delivery network CloudFlare's customer data was leaked. The data leaked had not just password hashes, but even customers' IP addresses and private messages. In June 2015, online password management service LastPass was hacked and had its data leaked online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We hash passwords with a one-way hashing algorithm, with multiple hashing iterations and individual salt per password. This means your password cannot be easily converted back to plain text. We, however, strongly advise you to change your password for any other services where you are using the same password," Zomato's chief technology officer Gunjan Patidar said in the blog which was updated twice through the day. Affected users have been logged out of the website and the app.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Password "hashing" is an encryption technique usually used for large online user databases. The strength of the encryption depends on the algorithm employed to do the same. "Salting" is the addition of a string of characters to the passwords when stored on such a database, which adds another layer of difficulty in cracking them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an email to TOI, a company spokesperson said, "Over the next couple of days, we'll be actively working to improve our security systems — we'll be further enhancing security measures for all user information stored within our database, and will also add a layer of authorisation for internal teams having access to this data to avoid any human breach."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;HackRead, a security blog and news website, found the stolen Zomato database of 17 million users for sale on what is called the "dark web". This can be described as a portion of the content available on the World Wide Web, away from the public internet. This content is not indexed on search engines like Google, and can only be accessed using software that can route around the public internet to get there.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the screenshots of the sale posted on HackRead, the Zomato database used a hashing technique called "MD5", which security experts say is inappropriate for encrypting passwords. "If MD5 was used, it shows bad security practices were in place. It isn't industry standard to use this algorithm for password hashing. Algorithms like bcrypt, scrypt, are more secure," says Pranesh Prakash, policy director at Bengaluru's Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What if a user does not use an exclusive Zomato account to sign into the service, but signs in through a Google or Facebook account? "In that case, just to be safe, you can delink your Zomato from the account you use to sign in, although your password will not be at risk," says Prakash. Zomato says, 60% of its users use such third party authorisation, and they are at "zero risk."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Would Zomato be liable to compensate end users for loss of sensitive data? Supreme Court advocate Pavan Duggal says, "Such players, referred to as intermediaries under the IT Act hold sensitive data and are expected to have reasonable security protocols in place. Should an end user face any loss/damage due to a data breach, they can sue Zomato and seek compensation." While most players have end user agreements and disclaimers in place, Duggal adds that the IT Act will prevail over any other law or contract to the extent it is inconsistent.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/the-times-of-india-may-19-2017-kim-arora-and-digbijay-mishra-hacker-steals-17-million-zomato-users-data-briefly-puts-it-on-dark-web'&gt;http://editors.cis-india.org/internet-governance/news/the-times-of-india-may-19-2017-kim-arora-and-digbijay-mishra-hacker-steals-17-million-zomato-users-data-briefly-puts-it-on-dark-web&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Hacking</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T05:57:14Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/home-images/Hackathon.png">
    <title>Hackathon at Bangalore</title>
    <link>http://editors.cis-india.org/home-images/Hackathon.png</link>
    <description>
        &lt;b&gt;Hackathon at Bangalore&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/home-images/Hackathon.png'&gt;http://editors.cis-india.org/home-images/Hackathon.png&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-12-10T07:01:02Z</dc:date>
   <dc:type>Image</dc:type>
   </item>


    <item rdf:about="http://editors.cis-india.org/internet-governance/news/business-standard-alnoor-peermohamed-may-19-2017-hack-exposes-zomatos-weak-protection-of-customer-data-say-cyber-experts">
    <title>Hack exposes Zomato's weak protection of customer data, say Cyber experts </title>
    <link>http://editors.cis-india.org/internet-governance/news/business-standard-alnoor-peermohamed-may-19-2017-hack-exposes-zomatos-weak-protection-of-customer-data-say-cyber-experts</link>
    <description>
        &lt;b&gt;Online restaurant aggregator says it will beef up security after 17 million user details were stolen.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by &lt;span&gt;&lt;a href="http://www.business-standard.com/author/search/keyword/alnoor-peermohamed" target="_blank"&gt;Alnoor Peermohamed&lt;/a&gt; was published in the Business Standard on May 19, 2017. Pranesh Prakash was quoted.&lt;/span&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span class="p-content"&gt;After details of over 17 million users was stolen and sold online, restaurants discovery and food ordering service &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Zomato" target="_blank"&gt;Zomato &lt;/a&gt;has vowed to beef up security measures, including adding a layer of authentication for its own employees to access user data. &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="p-content"&gt;
&lt;p&gt;The company in a blog post claimed that the leak appeared to be an  internal (human) security breach with an employee's development account  getting compromised.&lt;/p&gt;
&lt;p&gt;However, &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Cyber+Security" target="_blank"&gt;cyber security &lt;/a&gt;experts pointed out that &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Zomato" target="_blank"&gt;Zomato &lt;/a&gt;was clearly lacking in its technique to protect customer data from unwanted elements .&lt;/p&gt;
&lt;div class="article-middle-banner" id="div-gpt-ad-1490771277198-0"&gt;&lt;/div&gt;
&lt;p&gt;Sajal Thomas, a &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Cyber+Security" target="_blank"&gt;cyber security &lt;/a&gt;consultant, claimed on Twitter that he verified the sample data being sold on the dark web and found that &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Zomato" target="_blank"&gt;Zomato &lt;/a&gt;had  used MD5 to hash passwords. MD5 is neither encryption nor encoding, and  was known to be easily cracked by attacks and suffered from major  vulnerabilities.&lt;/p&gt;
&lt;p&gt;Further, he said &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Zomato" target="_blank"&gt;Zomato &lt;/a&gt;had  not used salting, a technique where random data was used as additional  input to make cracking a hashed password much harder. Thomas said that  it took just a few seconds to crack the hashed passwords to turn them  into plain text.&lt;/p&gt;
&lt;p&gt;&lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Zomato" target="_blank"&gt;Zomato &lt;/a&gt;in  its blog post, however, claimed that it protected "passwords with a  one-way hashing algorithm, with multiple hashing iterations and  individual salt per password."&lt;/p&gt;
&lt;p&gt;It said that this was to ensure that passwords could not be easily  converted back to plain text. The firm claimed no credit or debit card  information of users were leaked.&lt;/p&gt;
&lt;p&gt;While &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Zomato" target="_blank"&gt;Zomato &lt;/a&gt;says it has reset passwords of all the affected accounts, experts say that users whose data were leaked are still under threat.&lt;/p&gt;
&lt;p&gt;"If you had a password for &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Zomato" target="_blank"&gt;Zomato &lt;/a&gt;that  you used elsewhere (on facebook or email), immediately change that  password across all those accounts," tweeted Pranesh Prakash, policy  director at the Centre for Internet and Society.&lt;/p&gt;
&lt;blockquote class="twitter-tweet"&gt;
&lt;p dir="ltr"&gt;If you had a password for &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Zomato" target="_blank"&gt;Zomato &lt;/a&gt;that you used elsewhere, then IMMEDIATELY change that password across ALL those accounts. Use a pw manager! &lt;a href="https://t.co/CbhtxCwlnD"&gt;https://t.co/CbhtxCwlnD&lt;/a&gt;&lt;/p&gt;
— Pranesh Prakash (@pranesh) &lt;a href="https://twitter.com/pranesh/status/865136966190288896"&gt;May 18, 2017&lt;/a&gt;&lt;/blockquote&gt;
According to Prakash, a statement by &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Zomato" target="_blank"&gt;Zomato &lt;/a&gt;misled people on how serious the security breach was by providing a false sense of security.&lt;br /&gt; &lt;br /&gt; Subsequently, the company reworded its blog post to prompt users to  change passwords of other services where they might have used the same  password as their &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Zomato" target="_blank"&gt;Zomato &lt;/a&gt;account.
&lt;p&gt;The leak was first detected by security blog &lt;i&gt;HackRead&lt;/i&gt; when it  came across an online handle going by the name of "nclay" claiming to  have hacked Zomato's database and selling its data on the dark web. Upon  testing some of the data made public by the hacker, &lt;i&gt;HackRead&lt;/i&gt; found that each account actually existed on &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Zomato" target="_blank"&gt;Zomato.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;"The database includes emails and password hashes of registered &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Zomato" target="_blank"&gt;Zomato &lt;/a&gt;users  while the price set for the whole package is $1,001.43 (BTC 0.5587).  The vendor also shared a trove of sample data to prove that the data is  legit," &lt;i&gt;HackRead &lt;/i&gt;wrote in its post.&lt;/p&gt;
&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='http://editors.cis-india.org/internet-governance/news/business-standard-alnoor-peermohamed-may-19-2017-hack-exposes-zomatos-weak-protection-of-customer-data-say-cyber-experts'&gt;http://editors.cis-india.org/internet-governance/news/business-standard-alnoor-peermohamed-may-19-2017-hack-exposes-zomatos-weak-protection-of-customer-data-say-cyber-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-19T09:11:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
