sec

ISSF Junior World Championship 2024: Pistol shooter Divanshi’s second gold leads India’s clean sweep 

India’s young shooters won five more medals, including two gold on October 4, taking the tally to 21 medals to remain at the top with 13 gold, two silver and six bronze




sec

Misinformation fears mount over second Trump term

In the closing weeks of his 2024 campaign, Mr. Trump aired false claims about weather manipulation and government assistance after hurricanes hit North Carolina, a swing state




sec

Trump asks Mike Waltz, China hawk, to be national security adviser

There are concerns on Capitol Hill about Donald Trump tapping members of the House, where the final tally is still uncertain




sec

Trump expected to pick Marco Rubio for U.S. Secretary of State

Top role for Rubio could bolster Republicans' Latino gains; Rubio opposed $95 billion military aid to Ukraine




sec

Trump picks Kristi Noem for Homeland Security Secretary: report

Noem faced widespread backlash in April when she wrote in a memoir that she shot to death an "untrainable" dog that she "hated" on her family farm




sec

Alapati promises to support real estate sector

The former Minister appeals to all graduates of erstwhile Krishna and Guntur districts to as voters in the ensuing MLC elections and vote him to power




sec

Discrimination of Diptera order insects based on their saturated cuticular hydrocarbon content using a new microextraction procedure and chromatographic analysis

Anal. Methods, 2024, Accepted Manuscript
DOI: 10.1039/D4AY00214H, Paper
Open Access
Lixy Olinda León-Morán, Marta Pastor-Belda, Pilar Viñas, Natalia Arroyo-Manzanares, María Dolores García, María Isabel Arnaldos, Natalia Campillo
The nature and proportions of hydrocarbons in the cuticle of insects is characteristic of the species and age. Chemical analysis of cuticular hydrocarbons allows species discrimination, which is of great...
The content of this RSS Feed (c) The Royal Society of Chemistry




sec

A highly selective probe engineered to detect polarity and distinguish normal cells and tumor cells in tissue sections

Anal. Methods, 2024, Advance Article
DOI: 10.1039/D4AY00438H, Paper
Sai Zhu, Lixuan Dai, Xiaoli Zhong, Weiying Lin
We have designed a polarity fluorescent probe (DCI-Cou-polar) with high selectivity for diagnosing cancer.
To cite this article before page numbers are assigned, use the DOI form of citation above.
The content of this RSS Feed (c) The Royal Society of Chemistry




sec

QR codes for security in vehicles




sec

Culture and society: On upholding Section 6A of the Citizenship Act

Supreme Court of India verdict on citizenship law for Assam helps avoid fresh problems




sec

631: Dave’s Second Brain Idea, Notion Thoughts, and Google’s LLM in Chrome

Dave's got an idea for a second brain app that's customized to his brain, where we're at with Notion and other notes apps, and accessibility on LLM's in browsers.




sec

How ‘priority sector’ status can rev up Jan Dhan banking

How regulation can nudge private banks to promote financial inclusion




sec

The secret sauce behind ITC’s enduring restaurant brands

The promise of an unchanged, consistent menu and supreme culinary artistry has drawn food lovers to ITC’s tables for decades




sec

Attempts to douse Alipur warehouse fire continue on second day




sec

Security upped outside Canadian High Commission due to protest against temple attack

The Hindu Sikh Global Forum members are marching towards the High Commission in the Chanakyapuri area




sec

Desecration of a way of life

A story of how China ripped into the genteel charm of the traditional Buddhist society in Tibet




sec

Shivraj Chouhan blames Congress again for problems in agricultural sector; Opposition walks out in Rajya Sabha

Chairman Jagdeep Dhankhar asks Mr. Chouhan to look at pending issues of farmers




sec

Cabinet clears 7 schemes with ₹ 14,235.30 crore for agriculture sector

Digital Agriculture Mission, which has an outlay of ₹2.817 crore and aims to create a consolidated database on crop data, among initiatives to get nod; schemes to boost nutritional security and livestock production also approved




sec

Rupee settles flat at 84.07 against U.S. dollar for second straight session

The local unit was also weighed down by elevated crude oil prices as well as firm American currency amid rising U.S. treasury yields, forex traders said.




sec

State Planning Commission in Tamil Nadu flags sector-wise impact from heat wave, calls for measures

Heat stress is repeatedly causing disruptions in ecological and economic systems, SPC report titled ‘Beating The Heat-Tamil Nadu Heat Mitigation Strategy’ said.




sec

Samayamoorthy is HRM Secretary, Atul Anand is MSME Secretary




sec

Stalin urges Jaishankar to secure release of T.N. fishermen in Sri Lankan Navy’s custody

In his letter, Mr. Stalin sought immediate diplomatic efforts to prevent such arrests




sec

Iconography of Security

Molly Wilson and Eileen Wagner battle the age old Christmas issues of right and wrong, good and evil, and how the messages we send through iconography design can impact the decisions users make around important issues of security. Are you icons wise men, or are they actually King Herod?


Congratulations, you’re locked out! The paradox of security visuals

Designers of technology are fortunate to have an established visual language at our fingertips. We try to use colors and symbols in a way that is consistent with people’s existing expectations. When a non-designer asks a designer to “make it intuitive,” what they’re really asking is, “please use elements people already know, even if the concept is new.”

Lots of options for security icons

We’re starting to see more consistency in the symbols that tech uses for privacy and security features, many of them built into robust, standardized icon sets and UI kits. To name a few: we collaborated with Adobe in 2018 to create the Vault UI Kit, which includes UI elements for security, like touch ID login and sending a secure copy of a file. Adobe has also released a UI kit for cookie banners.

Activity log from the Vault Secure UI Kit, by Adobe and Simply Secure.
Cookie banner, from the Cookie Banner UI Kit, by Adobe.

Even UI kits that aren’t specialized in security and privacy include icons that can be used to communicate security concepts, like InVision’s Smart Home UI Kit. And, of course, nearly every icon set has security-related symbols, from Material Design to Iconic.

Key, lock, unlock, shield, and warning icons from Iconic.
A selection of security-related icons from Material Design.
Security shields from a selection of Chinese apps, 2014. From a longer essay by Dan Grover.

Many of these icons allude to physical analogies for the states and actions we’re trying to communicate. Locks and keys; shields for protection; warning signs and stop signs; happy faces and sad faces. Using these analogies helps build a bridge from the familiar, concrete world of door locks and keyrings to the unfamiliar, abstract realm of public- and private-key encryption.

flickr/Jim Pennucci
GPG Keychain, an open-source application for managing encryption keys. Image: tutsplus.com

When concepts don’t match up

Many of the concepts we’re working with are pairs of opposites. Locked or unlocked. Private or public. Trusted or untrusted. Blocked or allowed. Encouraged or discouraged. Good or evil. When those concept pairs appear simultaneously, however, we quickly run into UX problems.

Take the following example. Security is good, right? When something is locked, that means you’re being responsible and careful, and nobody else can access it. It’s protected. That’s cause for celebration. Being locked and protected is a good state.

“Congratulations, you’re locked out!”

Whoops.

If the user didn’t mean to lock something, or if the locked state is going to cause them any inconvenience, then extra security is definitely not good news.

Another case in point: Trust is good, right? Something trusted is welcome in people’s lives. It’s allowed to enter, not blocked, and it’s there because people wanted it there. So trusting and allowing something is good.

“Good job, you’ve downloaded malware!”

Nope. Doesn’t work at all. What if we try the opposite colors and iconography?

That’s even worse. Even though we, the designers, were trying both times to keep the user from downloading malware, the user’s actual behavior makes our design completely nonsensical.

Researchers from Google and UC Berkeley identified this problem in a 2016 USENIX paper analyzing connection security indicators. They pointed out that, when somebody clicks through a warning to an “insecure” website, the browser will show a “neutral or positive indicator” in the URL bar – leading them to think that the website is now safe. Unlike our example above, this may not look like nonsense from the user point of view, but from a security standpoint, suddenly showing “safe/good” without any actual change in safety is a pretty dangerous move.

The deeper issue

Now, one could file these phenomena under “mismatching iconography,” but we think there is a deeper issue here that concerns security UI in particular. Security interface design pretty much always has at least a whiff of “right vs. wrong.” How did this moralizing creep into an ostensibly technical realm?

Well, we usually have a pretty good idea what we’d like people to do with regards to security. Generally speaking, we’d like them to be more cautious than they are (at least, so long as we’re not trying to sneak around behind their backs with confusing consent forms and extracurricular data use). Our well-intentioned educational enthusiasm leads us to use little design nudges that foster better security practices, and that makes us reach into the realm of social and psychological signals. But these nudges can easily backfire and turn into total nonsense.

Another example: NoScript

“No UX designer would be dense enough to make these mistakes,” you might be thinking.

Well, we recently did a redesign of the open-source content-blocking browser extension NoScript, and we can tell you from experience: finding the right visual language for pairs of opposites was a struggle.

NoScript is a browser extension that helps you block potential malware from the websites you’re visiting. It needs to communicate a lot of states and actions to users. A single script can be blocked or allowed. A source of scripts can be trusted or untrusted. NoScript is a tool for the truly paranoid, so in general, wants to encourage blocking and not trusting. But:

“An icon with a crossed-out item is usually BAD, and a sign without anything is usually GOOD. But of course, here blocking something is actually GOOD, while blocking nothing is actually BAD. So whichever indicators NoScript chooses, they should either aim to indicate system state [allow/block] or recommendation [good/bad], but not both. And in any case, NoScript should probably stay away from standard colors and icons.”

So we ended up using hardly any of the many common security icons available. No shields, no alert! signs, no locked locks, no unlocked locks. And we completely avoided the red/green palette to keep from taking on unintended meaning.

Navigating the paradox

Security recommendations appear in most digital services are built nowadays. As we move into 2020, we expect to see a lot more conscious choice around colors, icons, and words related to security. For a start, Firefox already made a step in the right direction by streamlining indicators for SSL encryption as well as content blocking. (Spoilers: they avoided adding multiple dimensions of indicators, too!)

The most important thing to keep in mind, as you’re choosing language around security and privacy features, is: don’t conflate social and technical concepts. Trusting your partner is good. Trusting a website? Well, could be good, could be bad. Locking your bike? Good idea. Locking a file? That depends.

Think about the technical facts you’re trying to communicate. Then, and only then, consider if there’s also a behavioral nudge you want to send, and if you are, try to poke holes in your reasoning. Is there ever a case where your nudge could be dangerous? Colors, icons, and words give you a lot of control over how exactly people experience security and privacy features. Using them in a clear and consistent way will help people understand their choices and make more conscious decisions around security.


About the author

Molly Wilson is a designer by training and a teacher at heart: her passion is leveraging human-centered design to help make technology clear and understandable. She has been designing and leading programs in design thinking and innovation processes since 2010, first at the Stanford d.school in Palo Alto, CA and later at the Hasso-Plattner-Institut School of Design Thinking in Potsdam, Germany. Her work as an interaction designer has focused on complex products in finance, health, and education. Outside of work, talk to her about cross-cultural communication, feminism, DIY projects, and visual note-taking.

Molly holds a master’s degree in Learning, Design, and Technology from Stanford University, and a bachelor’s degree magna cum laude in History of Science from Harvard University. See more about her work and projects at http://molly.is.

Eileen Wagner is Simply Secure’s in-house logician. She advises teams and organizations on UX design, supports research and user testing, and produces open resources for the community. Her focus is on information architecture, content strategy, and interaction design. Sometimes she puts on her admin hat and makes sure her team has the required infrastructure to excel.

She previously campaigned for open data and civic tech at the Open Knowledge Foundation Germany. There she helped establish the first public funding program for open source projects in Germany, the Prototype Fund. Her background is in analytic philosophy (BA Cambridge) and mathematical logic (MSc Amsterdam), and she won’t stop talking about barbershop music.

More articles by Molly Wilson & Eileen




sec

Usability and Security; Better Together

Divya Sasidharan calls into question the trade-offs often made between security and usability. Does a secure interface by necessity need to be hard to use? Or is it the choice we make based on years of habit? Snow has fallen, snow on snow.


Security is often synonymous with poor usability. We assume that in order for something to be secure, it needs to by default appear impenetrable to disincentivize potential bad actors. While this premise is true in many instances like in the security of a bank, it relies on a fundamental assumption: that there is no room for choice.

With the option to choose, a user almost inevitably picks a more usable system or adapts how they interact with it regardless of how insecure it may be. In the context of the web, passwords are a prime example of such behavior. Though passwords were implemented as a way to drastically reduce the risk of attack, they proved to be marginally effective. In the name of convenience, complex, more secure passwords were shirked in favor of easy to remember ones, and passwords were liberally reused across accounts. This example clearly illustrates that usability and security are not mutually exclusive. Rather, security depends on usability, and it is imperative to get user buy-in in order to properly secure our applications.

Security and Usability; a tale of broken trust

At its core, security is about fostering trust. In addition to protecting user accounts from malicious attacks, security protocols provide users with the peace of mind that their accounts and personal information is safe. Ironically, that peace of mind is incumbent on users using the security protocols in the first place, which further relies on them accepting that security is needed. With the increased frequency of cyber security threats and data breaches over the last couple of years, users have grown to be less trusting of security experts and their measures. Security experts have equally become less trusting of users, and see them as the “the weakest link in the chain”. This has led to more cumbersome security practices such as mandatory 2FA and constant re-login flows which bottlenecks users from accomplishing essential tasks. Because of this break down in trust, there is a natural inclination to shortcut security altogether.

Build a culture of trust not fear

Building trust among users requires empowering them to believe that their individual actions have a larger impact on the security of the overall organization. If a user understands that their behavior can put critical resources of an organization at risk, they will more likely behave with security in mind. For this to work, nuance is key. Deeming that every resource needs a similarly high number of checks and balances diminishes how users perceive security and adds unnecessary bottlenecks to user workflows.

In order to lay the foundation for good security, it’s worth noting that risk analysis is the bedrock of security design. Instead of blindly implementing standard security measures recommended by the experts, a better approach is to tailor security protocols to meet specific use cases and adapt as much as possible to user workflows. Here are some examples of how to do just that:

Risk based authentication

Risk based authentication is a powerful way to perform a holistic assessment of the threats facing an organization. Risks occur at the intersection of vulnerability and threat. A high risk account is vulnerable and faces the very real threat of a potential breach. Generally, risk based authentication is about calculating a risk score associated with accounts and determining the proper approach to securing it. It takes into account a combination of the likelihood that that risk will materialize and the impact on the organization should the risk come to pass. With this system, an organization can easily adapt access to resources depending on how critical they are to the business; for instance, internal documentation may not warrant 2FA, while accessing business and financial records may.

Dynamically adaptive auth

Similar to risk based auth, dynamically adaptive auth adjusts to the current situation. Security can be strengthened and slackened as warranted, depending on how risky the access point is. A user accessing an account from a trusted device in a known location may be deemed low risk and therefore not in need of extra security layers. Likewise, a user exhibiting predictive patterns of use should be granted quick and easy access to resources. The ability to adapt authentication based on the most recent security profile of a user significantly improves the experience by reducing unnecessary friction.

Conclusion

Historically, security failed to take the user experience into account, putting the onus of securing accounts solely on users. Considering the fate of password security, we can neither rely on users nor stringent security mechanisms to keep our accounts safe. Instead, we should aim for security measures that give users the freedom to bypass them as needed while still protecting our accounts from attack. The fate of secure systems lies in the understanding that security is a process that must constantly adapt to face the shifting landscape of user behavior and potential threats.


About the author

Divya is a web developer who is passionate about open source and the web. She is currently a developer experience engineer at Netlify, and believes that there is a better workflow for building and deploying sites that doesn’t require a server—ask her about the JAMstack. You will most likely find her in the sunniest spot in the room with a cup of tea in hand.

More articles by Divya




sec

Uniqlo turns three in the India market; launches second edition of its collaboration with Italian luxury fashion house Marni

Headquartered in Tokyo, the Japanese apparel brand focusses on technology and sustainability, and its latest collection of fleece jackets is made of recycled PET bottles



  • Life & Style

sec

Public sector – Saab Chalta Hai!




sec

SEBI proposes ₹1 crore minimum investment, mandatory demat form for securitised debt instruments

Securitised debt instruments (SDIs) issued privately to be offered to a maximum of 200 investors, public offers to remain open for a minimum of three days and a maximum of 10 days, proposes SEBI




sec

Urban co-op banks’ body to facilitate buying and selling of priority sector loans

The National Urban Cooperative Finance and Development Corporation will help mid and small sized UCBs upgrade their technology architecture and ensure the sector’s money remains within the sector



  • Money & Banking

sec

Results preview: SBI’s second-quarter net profit may rise 20%

Axis Capital sees the SBI’s loan growth in at 15 per cent vs 16 per cent in the first quarter



  • Money & Banking

sec

LIC Q2FY25 results second quarter standalone net profit declined about 4%

Second quarter standalone net profit declined about 4 per cent year-on-year (y-o-y) to Rs ₹7,621 crore



  • Money & Banking

sec

Endowments Secretary and Commissioner takes oath as ex-officio member of TTD Trust Board




sec

Andhra Pradesh Budget will benefit all sections of people, says JSP leader

‘The coalition government is keen to implement promises given to people during the election’




sec

Andhra Pradesh govt.. to deploy ‘kisan drones’ in agriculture sector this year

The drones would be mainly helpful in spraying fertilizer and pesticides, and said all villages in the State are targeted to be covered in three years, says Minister Atchannaidu




sec

Good potential for cosmetic, textile, food processing sectors in Andhra Pradesh: South Korean diplomat

South Koreans are familiar with Andhra Pradesh and since Kia Motors is here, more Korean companies may wish to come too, says Sangwoo Lim




sec

Ensuring private sector collaborations in India’s national climate strategy

For this, the Competition Commission of India needs to focus on the interplay between competition law and sustainability




sec

The private sector holds the key to India’s e-bus push

If there is to be scale in the electric bus market in India, private sector participation is critical




sec

IIM Calcutta secures 100% MBA placements; median stipend ₹2 lakh/month




sec

Courses and careers in the aviation sector

Technical maintenance, management, piloting ... there are multiple promising career paths in this sector in India.




sec

As its industry struggles, Germany services sector offers untapped growth potential




sec

Stanchart opens second International Banking Centre in Chennai




sec

Twin-monsoon failures of 2012 have left plantation sector numb




sec

'Secret Superstar' quick review




sec

Senior living faces a supply gap, with Tamil Nadu seen as a key growth area for the sector

CEOs of key firms, in conversation with businessline, discuss Tamil Nadu’s potential due to its large senior population




sec

Talent, tech sector drive Hyderabad’s real-estate growth: CBRE-CREDAI report

‘Hyderabad accounts for 14 per cent of aggregate national office stock’




sec

GoM to review GST on JDA in real estate sector, Council to meet on September 9

HC had ruled in February that transfer of right to develop land under JDA shall be taxable




sec

Ajoy Mehta leaves behind a more compliant real estate sector in Maharashtra

The Maharashtra Real Estate Regulatory Authority’s outgoing chairman did not shy away from wielding the regulatory whip, ensuring that builders realised that homebuyers have the right to expect timely delivery of their houses, with all the promised amenities




sec

Bengaluru leads retail/consumer packaged goods GCC boom as India sees rapid growth in the sector

The ANSR report anticipates over 25 new GCCs in the sector to emerge in the next 2-3 years, further solidifying India’s position as a global hub




sec

Realty sector rises 63%, outshining Nifty50; more firms eye IPOs

The sector is attracting new entrants via record IPOs, with seven listings raising ₹13,550 crore in 2024, showing strong investor interest in this thriving market.




sec

Call to use of path-breaking technology in construction sector

Adoption of insulation technology is currently delivering substantial benefits, including a massive 80 per cent reduction in energy utilization for homes using air conditioning




sec

Telangana Cyber Security Bureau conducts digital awareness campaign for senior citizens