Blog

September 2015

Why Ashley Madison Wasn’t Anonymous Before the Breach

0

Estimated reading time: 4 minutes

This is a guest post written by Cassie Phillips, A Writer and Technology Enthusiast. Out of the many big name cyberattacks that have happened this year, none have gotten more press than the Ashley Madison hack (and subsequent information dump). The hack caused a huge stir, ruined marriages, and caused...

Android Lollipop Users Vulnerable to Massive Password Hack Attack

  • 1
    Share
31

Estimated reading time: 2 minutes

A group of researchers at Texas University in Austin, have discovered a security flaw in mobile phones running the Android Lollipop version. What is this security flaw? This flaw allows anyone to bypass the lockscreen of an Android phone by using a massive password, and expose the home screen, thereby...

Delete Your WhatsApp Chats and Become a Criminal

22

Estimated reading time: 3 minutes

The Government recently released a draft of National Encryption Policy which has got a lot of coverage in the press over the last few days. Very few people actually agree with the purpose of this policy since it threatens to leave hordes of personal user data vulnerable to spying by...

How to Stop Windows 10 Upgrade from Downloading on your PC

2

Estimated reading time: 2 minutes

If you are among those who are happy with Windows 7/8.1 and do not wish to migrate to Windows 10, then you can stop about 6GB of unnecessary files getting downloaded on your PC. To make users of Windows 7 and 8.1 ready for Windows 10, Microsoft has been quietly...

Two Mistakes You’re Making While Charging Your Smartphone Battery

9

Estimated reading time: 3 minutes

One of the most common complaints that anyone who uses a smartphone has, is regarding the battery of the device. While our new phones are packed with powerful features, ultrafast processors and are also as thin as a wafer, all this leads to a situation where the battery life of...

Why it is Unsafe to Use Pattern Locks to Protect Your Smartphone

  • 1
    Share
35

Estimated reading time: 3 minutes

When it comes to smartphone security, one of the first things that we recommend is to switch on the screen lock feature. A surprisingly large number of people are still using their phones without any kind of screen lock enabled and this is a major security loophole that leaves their...

8 Security Tips to Avoid Falling Prey to SIM Swap Frauds

  • 8
    Shares
84

Estimated reading time: 3 minutes

With online banking gradually becoming a preferred choice of financial transaction for most, fraudsters have renewed their malicious efforts to target their victims. A relatively new type of fraud has come to light. It is known as SIM swap fraud. And we’re here to tell you how you can avoid...

Be Careful of these 5 Internet Scams Running on Facebook

  • 9
    Shares
8

Estimated reading time: 4 minutes

As of last quarter, Facebook has over 1.19 billion monthly active users, with 728 million users using the service daily. On the dark side of the world, this figure amounts to the number of victims that online scammers have charted on their dartboards. Unarguably, Facebook is the most lucrative avenue...

The Biggest Apple iPhone Malware Hack Ever

41

Estimated reading time: 2 minutes

Ever since the first iPhone released 8 years back, it has been surprisingly secure. There have been very few instances of malware and hacks on these devices, especially in comparison to the more open and less secure Android platform. From time to time though, a hack on iPhones comes along...