Facebook planning to allow under-13s: Is this a good decision?

Simon Milner, Head of Policy in Facebook, Britain, recently declared that Facebook is planning to abolish the act of disallowing children below 13 years of age from becoming members (this CNET post explains the situation well). The opinions obviously are divided straight down the middle. Many parents feel that this age limit is necessary as […]

Infographic: Quick Heal’s DNAScan Technology

As the proliferation of the Internet and the use and abuse of Web 2.0 increases, computer users are exposed to zero-day threats and risks that propagate in real-time. Any access to the Internet without protection is no doubt clogged with spyware, adware and dangerous bots. It doesn’t stop at this, the situation gets trickier even […]

Thinking of rooting your precious Droid? Here’s why it may not be such a good idea

The massive popularity of Android smartphones has brought several features and options of the OS to the public domain. One of these options remains the ability to ‘root’ the device. Rooting an Android phone implies gaining (superuser) access to the kernel code of the software and using this access to improve performance and enjoy/replace several […]

Beware: Fake Antivirus Scanner Targeting Android Users on Twitter

Social media networks are very good hunting grounds for scammers and this is another such instance of a new scam (targeting Android) spreading on Twitter. This scam consists of enticing tweets that tempts users to click them. The links in these messages carry a ‘.TK’ extension and direct the users to unsafe web pages that […]

Infographic: The myth about smartphone invulnerability

Contrary to popular belief, the user-programmable miniature yet powerful mobile devices used for carrying data, sending e-mails, social networking, banking, gaming, downloading music and video aided with the rampant use of third party software, are not invincible. There are increasing problems from applications that upload malware or exploit vulnerabilities in new operating systems, either inadvertently […]

A few tricks to avoid the ‘Phishing’ trap

Phishing is a technique that scammers use to obtain personal information by posing to be from a legitimate source. As a result, there are many people who fall for phishing emails. We regularly update this blog with details about fraudulent emails that attempt to phish for information, but now we would like to tell readers […]

Microsoft May-2012 Patch Tuesday Released

Microsoft has released 7 bulletins covering a total of 11 vulnerabilities. Eight of this month’s issues are rated ‘Critical’ and they affect Windows, .NET, Office and Silverlight. The remaining issues affect Office and Windows. The following vulnerabilities are rated “Critical”: MS12-029- Vulnerability in Microsoft Word Could Allow Remote Code Execution (2680352) This security update resolves […]