Third-Party Apps becomes significant source of Malware Attacks on Android Smartphones

We love options! But smart people also love the authenticity of the options available. Most of us rely…

Enterprise Security: Mobile ad libraries pose new security threats

A new threat to enterprise security that many organizations neglect and fail to address effectively is that of…

The rise of WhatsApp Plus and should you install it?

The other day we received a rather interesting notification from one of our users about a service called…

Alert for users of Instagram, Bitly and Android and other security news

There is no such thing as a slow news day, as every week is filled with stories of…

5 Tips for Online Smartphone Shopping Nobody Tells You About

The new Flipkart app is pretty amazing, isn’t it? If you haven’t tried it out as yet, you…

Beware – Fake Google Apps Spotted Over Windows Phone Store!

Windows Phone has a worldwide market share of less than 5% in 2014, and this has led to…

Instagram: What you need to know – Part 2

This post is in continuation with our previous post on Instagram and will discuss how you can control…

Instagram: What you need to know

In an earlier post we talked about various apps and the risks associated with them. In these subsequent…

Why USB drives and CDs are a security risk to your corporate network

It is common knowledge that business organizations need to make significant investments to safeguard their data. This involves…

Massive Android botnet invades China: Could India be the next target?

A massive Trojan botnet has been discovered in Android devices in China and this serves as a timely…