In the last post on hacktivism, we briefly mentioned three different types of hackers – white-hat hackers, grey-hat…
In the last post on hacktivism, we briefly mentioned three different types of hackers – white-hat hackers, grey-hat…
Hacktivism is a rising threat to cyber security that we are sure to see more of in the…
India is gradually coming down to the draconian path of Internet governance – a fact that is a…
Simon Milner, Head of Policy in Facebook, Britain, recently declared that Facebook is planning to abolish the act…
As the proliferation of the Internet and the use and abuse of Web 2.0 increases, computer users are…
The massive popularity of Android smartphones has brought several features and options of the OS to the public…
Social media networks are very good hunting grounds for scammers and this is another such instance of a…
Contrary to popular belief, the user-programmable miniature yet powerful mobile devices used for carrying data, sending e-mails, social…
A few days backs I posted a blog regarding fake USPS (United States Postal Service) emails. Today I…
Phishing is a technique that scammers use to obtain personal information by posing to be from a legitimate…