Blog

June 2013

Apps that every parent should know about

  • 1
    Share
23

Estimated reading time: 3 minutes

Beginning of the school year is a delicate time for children and youth. If academic expectations are not enough, children seem to believe that they are expected to live up to peer-pressure as well. This is always accompanied by insecurities and complexes. There are helplines, guides and mentors that exist...

Watering Hole Attack – An Overview

25

Estimated reading time: 3 minutes

Guess what would be a better way for a predator to stalk its prey, rather than chasing it? Well, waiting patiently at a watering hole, where its prey would eventually turn up. Strangely, in the online world, hackers are also using the same strategy to trap their victims. This blog...

This Week’s Dose of Latest Security News and Updates

8

Estimated reading time: 2 minutes

Already planning for the weekend, good! But first, let’s see what security news and updates various anti-virus experts have for us! Zeus – the Global Malware is Back! A popular fan book page – “Bring the N.F.L. To Los Angeles”, as New York Times has reported, is housing the notorious...

Exponential Rise in Mobile Internet Beckons Better Mobile Security

10

Estimated reading time: 2 minutes

If we are to believe what tech pundits have to say, mobile devices are going to rule the roost when it comes to Internet usage, in the coming years. Reportedly, mobile data traffic in 2012 has been recorded to be 12 times higher than global Internet traffic in 2000. Globally,...

Security News and Updates for this Week

5

Estimated reading time: 2 minutes

Let’s catch up on some important news and updates related to IT security. Guess What’s New on the Platter of Chinese Hackers? – U.S. Weapon Designs Looks like Chinese hackers are leaving no stone unturned; reportedly, they hacked their way into the designs of more than 2 dozen weapons of...