Blog
Rajib Singha

About Rajib Singha

Rajib is a Physics graduate and a technology enthusiast. Besides having a keen interest in the latest gadgets, he is also into IT security and all that it encompasses.

Google helps you find answers to your questions; Google gives away apps for free; Google has an awesome hangout for you and your pals, but Google never pays you 800,000 British pounds! That’s right! One more online scam that has been making rounds on the Internet is the Google Award...
BYOD – Bring Your Own Device, apparently, has become the new mantra in today’s workplace. Its benefits are appealing and attractive, but they also come with major threats and concerns. This post  outlines some important facts about the BYOD program. There is a reason Tim Cook (CEO of Apple Inc.)...
With another week wrapping up, let’s quickly leaf through the latest news and updates from the security community. Pirate Bay Co-Founder Sentenced to Two Years in Prison Gottfrid Svartholm Warg, 28, co-founder of the popular torrent site “The Pirate Bay”, is to serve two years in jail. He was found...
This week’s been quite an eventful one, with Facebook bringing in hashtags and Mumbai police force facing the brunt of cybercrime. Read on. Facebook Hashtags – Exciting or Worrying? If you never paid attention to your privacy settings on Facebook, then it’s time you started doing so. With the Social...
When it comes to desktop computers, people go for the best security software. But when the talk is about their mobile security, odds are, they are least bothered. Most think that their mobile devices are less vulnerable than their computers; that however, is a myth, and probably a dangerous one....
Does your computer’s security software have Parental Control features in it? If no, then this blog will tell you why you should have one. With summer holidays coming to an end, kids will be bombarded with homework and assignments. And if you have Internet in the house, then your kids...
Guess what would be a better way for a predator to stalk its prey, rather than chasing it? Well, waiting patiently at a watering hole, where its prey would eventually turn up. Strangely, in the online world, hackers are also using the same strategy to trap their victims. This blog...