#Android #Applications #Hacker #Malware #Mobile Security #Smartphone Exponential Rise in Mobile Internet Beckons Better Mobile Security If we are to believe what tech pundits have to say, mobile devices are going to rule the roost when Sakshat Karkare / 13 years Comment (10) (49)
#Android #Apple #Applications #Cyber crime #Cyber safety #Email #Facebook #FAQs #Hacker #Hacktivism #Malware #Online Hoaxes #Password #Phishing #Social Engineering #Spam #Tips #Twitter How do Cyber Criminals get away with Social Engineering Tricks – Infographic In an earlier post, we had discussed various tricks that cyber criminals use to get what they want. This infographic Soumya Patnaik / 13 years Comment (3) (58)
#Applications #Cyber crime #Cyberwar #Email #Hacker #Hacktivism #Malware #Online Hoaxes #Phishing #Social Engineering #Tips Classic lies you should not let a cyber criminal use on you Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out certain actions Soumya Patnaik / 13 years Comment (72) (94)
#Adobe #Applications #Mac OS #Microsoft windows #News #Security patch #Tips Adobe addresses serious vulnerabilities with its latest patches Adobe Systems has released improved versions of Flash Player, Shockwave Player and ColdFusion to patch critical vulnerabilities in these. As Soumya Patnaik / 13 years Comment (10) (54)
#Android #Apple #Applications #Cyber crime #Cyber safety #Facebook #FAQs #Location tracking #Mac OS #News #Password #Spam #Tips #Twitter Instagram: What you need to know – Part 2 This post is in continuation with our previous post on Instagram and will discuss how you can control your privacy Soumya Patnaik / 13 years Comment (6) (76)
#Android #Apple #Applications #Cyber crime #Facebook #Google #Location tracking #Smartphone Instagram: What you need to know In an earlier post we talked about various apps and the risks associated with them. In these subsequent posts, we Soumya Patnaik / 13 years Comment (4) (80)