#Android #Malware They come, they hide, and they mess up – Android.Obad and Android.Fakedefender It looks like malware writers are leaving no stone unturned to target the Android platform. They are exploring every opportunity Subhrojyoti Chowdhury / 13 years Comment (50) (74)
#Android #Apple #Applications #BYOD #Cyber crime #Cyber safety #Facebook #FAQs #Future watch #Hacker #iOS #Mobile Security #News #Online Hoaxes #Smartphone #Social Engineering #Twitter Whatsapp Hoax (fake) Messages Doing the Rounds Again Today one of my colleagues received a message on WhatsApp that read: “Hello, I. Am riya director of whatsapp, this Soumya Patnaik / 13 years Comment (55) (131)
#Android #Apple #Applications #Cyber crime #Cyber safety #FAQs #iOS #Mobile Security #Password #Smartphone #Tips Apps that every parent should know about Beginning of the school year is a delicate time for children and youth. If academic expectations are not enough, children Soumya Patnaik / 13 years Comment (23) (65)
#Android #Applications #Hacker #Malware #Mobile Security #Smartphone Exponential Rise in Mobile Internet Beckons Better Mobile Security If we are to believe what tech pundits have to say, mobile devices are going to rule the roost when Sakshat Karkare / 13 years Comment (10) (53)
#Android #Apple #Applications #Cyber crime #Cyber safety #Email #Facebook #FAQs #Hacker #Hacktivism #Malware #Online Hoaxes #Password #Phishing #Social Engineering #Spam #Tips #Twitter How do Cyber Criminals get away with Social Engineering Tricks – Infographic In an earlier post, we had discussed various tricks that cyber criminals use to get what they want. This infographic Soumya Patnaik / 13 years Comment (3) (60)
#Android #Apple #Applications #Cyber crime #Cyber safety #Facebook #FAQs #Location tracking #Mac OS #News #Password #Spam #Tips #Twitter Instagram: What you need to know – Part 2 This post is in continuation with our previous post on Instagram and will discuss how you can control your privacy Soumya Patnaik / 13 years Comment (6) (78)
#Android #Apple #Applications #Cyber crime #Facebook #Google #Location tracking #Smartphone Instagram: What you need to know In an earlier post we talked about various apps and the risks associated with them. In these subsequent posts, we Soumya Patnaik / 13 years Comment (4) (82)
#Android #Apple #Google #Location tracking #Mac OS #Smartphone #Tips How to avoid accidental in-app purchases by kids on your Smartphone? Uncontrolled in-app purchases can result in huge bills for your Smartphone. However, the feature can be easily turned off. Needless Vineet Sarote / 13 years Comment (5) (71)
#Android #News Massive Android botnet invades China: Could India be the next target? A massive Trojan botnet has been discovered in Android devices in China and this serves as a timely reminder of Adithya Omanakuttan / 13 years Comment (25) (70)
#Android #News The growing threat of mobile malware: Top Android malware families of 2012 The open-source nature of the Android platform is its biggest strength and Achilles heel at the same time. Android handsets Adithya Omanakuttan / 13 years Comment (78) (222)