Blog

October 2013

The BlackBerry Messenger has been finally rolled out on the streets for Android users. So, while you may be going all gaga over the new and sleek IM, ensure that you are getting the real deal and not just another shady, phony BBM messenger.   The BlackBerry Messenger for Android...
When we speak of online safety for kids, our first priority should be setting up a guard against online predators. These obnoxious people are everywhere on the Internet, just waiting with their net to trap an easy prey. Parental guidance and a little awareness can go a long way into...
Information Security’s Worth in India will be 25 crore this year In the wake of rising cyber threats, information security in the country will be fueled by an average of 25 crore in 2013. This is according to a State of Information Security Survey 2014, conducted by Pricewaterhouse Coopers (PwC),...
In our earlier blog post, we talked about the top 20 malware plaguing the Android platform. In this post, we will give you an insight into how each of these malware function once they gain entry into targeted devices. The Top 20 Android Malware 1. Android.FakeRun.A • Android.FakeRun.A is designed...
Since the time Android made its entry into the Smartphone arena, it ruffled quite a few players; even the big ones. At present time, Google Android grips a tight 51.6% of the US market share (source: www.androidcentral.com, report as of August 2013). The open source nature of Android has made...
WhatsApp Site taken down by Hackers WhatsApp has again made the headlines, thanks to a hacking group called KDMS Team. Netizens who visited the Web site of the most popular instant messaging service, reported defacement of the site. The company issued a statement admitting that their Web site was hijacked...
Adobe Hacked – Data of 2.9 million Customers Compromised! Adobe has announced in its blog of a major security breach that compromised the data of 2.9 million of its customers. According to the company’s chief security officer, the hacked data mainly included customer IDs, encrypted passwords, encrypted credit and debit...