Blog

March 2013

The next time when you visit an ATM of your bank to swipe your debit or credit card make sure the ATM door or the ATM machine does not have any suspicious device attached to it. Cyber criminals fix various kinds of skimmers on ATM doors or ATM machine itself...
Three months ago Facebook revealed Graph Search which had a lot of mixed reviews. While some reviewers considered it to be a great marketing tool for direct messages, others expressed that it could bring huge security concerns with it. What is Graph Search? Touted to be the ultimate search tool...
Does your child have access to a Smartphone? Then it’s about time you know about certain apps that are popular with children and young adults. Most of these apps are designed to keep your children’s online conversation as private as possible. Some allow them to take a picture and share...
Recently I came across an email which pretends to be from Apple corporate office. The email reads, that the company is conducting an Apple ongoing Anniversary award ceremony and that the reader is the lucky winner to have won the award of Five Hundred Thousand Great British Pounds (500,000.00) through...
Uncontrolled in-app purchases can result in huge bills for your Smartphone. However, the feature can be easily turned off. Needless to say, ‘free’ apps in Google Play or iTunes Store are always more preferable than their ‘paid’ counterparts. However, these apps work using a ‘freemium’ model to generate revenue. Yes,...
Personal information of app users leaked on Google Play People who still disregard Android security and do not take privacy controls over the platform seriously, will be alarmed to learn this piece of news. An Australian app developer recently discovered that he had complete access to personal information of the...