Street food in India safer than other tourist restaurants

July 11, 2014

Street foodMelbourne, Jul 11: Dispelling the common misconception that street food available in India is 'unhealthy and unhygienic', a well known Australian culinary historian has said that she found street foods safer than restaurants catering to tourists.

Charmaine O'Brien, the author of the recently released 'The Penguin Food Guide to India', was talking during a discussion on 'Its not Curry - Eating India' at the University of Melbourne based Australia India Institute (AII) here yesterday.

She said the thousands of small regional food vendors or hawkers across India mostly sold freshly cooked meals using fresh ingredients during her culinary tour to the country.

However, she suggested dodging Delhi belly after eating street food in India could vary from person to person and that one should follow their own instincts.

Her latest book, launched earlier this year at the Australian High Commission in New Delhi, is the first comprehensive documentation of Indian regional food and could be read as a literary reference work on Indian food history and culture.

The book, a result of four years of extensive research, has illustrated evolution and development of regional cuisines across India.

Elaborating on Indian food cuisine and culture, O'Brien said Indian regional food was most complex and offered a diverse cuisine unlike known to outside world.

"Indian food is laden with history, culture, religion, economic conditions as well as weather," she said.

Even trade affected the development of Indian cuisines, she said adding 'In Madurai, the Chettinad cuisine has expensive spices like fennel, coriander, clove, cinnamon which reflected that people were wealthy and trade happened, O'Brien said.

"In desert like Kutch, there was an extensive use of millet as it was locally grown and was fast to grow so the Kutchi cuisine developed with very limited ingredients which were easily available there," she said.

"People of Kutch were mainly animal herders so they produced and used dairy products like Ghee which also suited the climatic conditions," she said.

O'Brien said that there were many regional sweet dishes where traces of Middle eastern origin could be found, apparently from Arab traders who came into India, she cited.

"There are different varieties of Halwa similar to Turkish delight which probably evolved because of Arab traders there," she said.

O'Brien said despite enormous variety of Indian food across all four corners, outside India including in Australia there was a very limited knowledge about it.

"Indian Restaurants and eateries overseas have been mostly serving similar dishes like Chicken tikka or Spicy curries that has reflected that India had a homogeneous national cuisine," O'Brien said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 18,2020

New Delhi, Jul 18: India's national cybersecurity agency CERT-in, has warned people of credit card skimming spreading across the world through e-commerce platforms.

Attackers are typically targeting e-commerce sites because of their wide presence, popularity and the environment LAMP (Linux, Apache, MySQL, and PHP), the Computer Emergency Response Team (CERT-In) said in a notice on Thursday.

Recently, attackers targeted sites which were hosted on Microsoft's IIS server running with the ASP.NET web application framework, it said.

Some of the sites affected by the attack were found to be running ASP.NET version 4.0.30319, which is no longer officially supported by Microsoft and may contain multiple vulnerabilities, CERT-In said.

The notice also included a list of best practices for website developers including the use of the latest version of ASP.NET web framework, IIS web server and database server.

The advisory is based on research by Malwarebytes which found that this skimming campaign likely began sometime in April this year.

Credit card skimming has become a popular activity for cybercriminals over the past few years, and the increase in online shopping during the pandemic means additional business for them, too, Malwarebytes said in a blog post, adding that attackers do not need to limit themselves to the most popular e-commerce platforms.

Researchers from global cybersecurity and anti-virus brand Kaspersky had warned in December last year that more cybercriminal groups will target online payment processing systems in 2020. 

It said that over the past couple of years, so-called JS-skimming (the method of stealing of payment card data from online stores), has gained immense popularity among attackers. 

Kaspersky researchers in their report said they are currently aware of at least 10 different actors involved in these type of attacks.

Their number will continue to grow during the next year, the report said, adding that the most dangerous attacks will be on companies that provide services such as e-commerce as-a-service, which will lead to the compromise of thousands of companies.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
June 30,2020

Bengaluru, Jun 30: Karnataka Chief Minister BS Yediyurappa on Monday launched 'Skill Connect Forum' and said that the government is committed to provide impetuous to creating jobs by reviving economic and industrial activities.

The 'Skill Connect Forum' portal connects both private entrepreneurs and job seekers on the same platform.

After launching the forum, the Chief Minister said that the portal provides information on jobs available and who needs a job. "Under this forum, an unemployed will be imparted skills and then enabled to get a job," Yediyurappa said.
Besides providing jobs via registration, the portal also provides a skilled pool of people for those looking to hire, he added.

Deputy Chief Minister Dr CN Ashwath Narayan, who is also the Skill Development Minister said that portal will be a boon to the youth seeking jobs and it will avoid unemployment issue to a great extent.

"All these years, there was no information and communication between job seekers and recruiters. The portal will solve that problem," he said.

Narayan said that there was no proper information on skilled workers and job market. Moreover, skill development was not in sync with the market. All these issues have been addressed by the portal, he added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.