Users of Quick Heal security products and readers of this blog are well aware of the exclusive features…
Users of Quick Heal security products and readers of this blog are well aware of the exclusive features…
In the last post on hacktivism, we briefly mentioned three different types of hackers – white-hat hackers, grey-hat…
Hacktivism is a rising threat to cyber security that we are sure to see more of in the…
Simon Milner, Head of Policy in Facebook, Britain, recently declared that Facebook is planning to abolish the act…
As the proliferation of the Internet and the use and abuse of Web 2.0 increases, computer users are…
The massive popularity of Android smartphones has brought several features and options of the OS to the public…
Contrary to popular belief, the user-programmable miniature yet powerful mobile devices used for carrying data, sending e-mails, social…
Phishing is a technique that scammers use to obtain personal information by posing to be from a legitimate…
According to recent Gartner and IDC reports, the total sales of smartphones in 2011 went as high as…
We hear about Facebook accounts getting hacked on a daily basis. With hackers dedicated to pounce on the…