Just like a vehicle regularly needs servicing in order to function smoothly, a computer requires maintenance and care…
Just like a vehicle regularly needs servicing in order to function smoothly, a computer requires maintenance and care…
Millions of hackers target Israel after Gaza offensive Israel undertook air-based attacks against the Gaza strip last week…
Facebook offers new privacy setting indicators for new users In a move that suggests Facebook has begun to…
Government plans for 5 lakh cyber warriors for e-defense Having recognized the need for defense against extensive cyber…
AntiSec collects 12 million Apple UDIDs from hacked FBI laptop, FBI denies it! AntiSec, a hacker group associated…
Fake BlackBerry account activation email A fake BlackBerry account creation email is doing the rounds. The content of…
Android malware learns a new trick Mobile security software and a cautious nature can help you avoid risky…
Yesterday I discussed the potential risks of NFC technology and how an attacker could ‘eavesdrop’ on NFC signals….
Imagine a scenario where a customer walks into a supermarket to buy groceries. She receives a greeting and…
Location mapping is a highly useful tool to study social behavior but it also poses a real threat…