How to tell the difference between White-Hat, Grey-Hat and Black-Hat hackers

In the last post on hacktivism, we briefly mentioned three different types of hackers – white-hat hackers, grey-hat hackers and black-hat hackers. This post will delve into these three and help you understand the categories better. A hacker, as we all know by now, is someone who utilizes his understanding of computers and software coding […]

Facebook planning to allow under-13s: Is this a good decision?

Simon Milner, Head of Policy in Facebook, Britain, recently declared that Facebook is planning to abolish the act of disallowing children below 13 years of age from becoming members (this CNET post explains the situation well). The opinions obviously are divided straight down the middle. Many parents feel that this age limit is necessary as […]

Infographic: Quick Heal’s DNAScan Technology

As the proliferation of the Internet and the use and abuse of Web 2.0 increases, computer users are exposed to zero-day threats and risks that propagate in real-time. Any access to the Internet without protection is no doubt clogged with spyware, adware and dangerous bots. It doesn’t stop at this, the situation gets trickier even […]

Thinking of rooting your precious Droid? Here’s why it may not be such a good idea

The massive popularity of Android smartphones has brought several features and options of the OS to the public domain. One of these options remains the ability to ‘root’ the device. Rooting an Android phone implies gaining (superuser) access to the kernel code of the software and using this access to improve performance and enjoy/replace several […]

Infographic: The myth about smartphone invulnerability

Contrary to popular belief, the user-programmable miniature yet powerful mobile devices used for carrying data, sending e-mails, social networking, banking, gaming, downloading music and video aided with the rampant use of third party software, are not invincible. There are increasing problems from applications that upload malware or exploit vulnerabilities in new operating systems, either inadvertently […]

A few tricks to avoid the ‘Phishing’ trap

Phishing is a technique that scammers use to obtain personal information by posing to be from a legitimate source. As a result, there are many people who fall for phishing emails. We regularly update this blog with details about fraudulent emails that attempt to phish for information, but now we would like to tell readers […]

Massive Smartphone sales reveal growing security concerns

According to recent Gartner and IDC reports, the total sales of smartphones in 2011 went as high as 490 million units. This number is estimated to rise to 600 million units in the current year and we need to take a second to take in these figures. Smartphones are steadily embedding themselves in lives all […]

Has your Facebook account been hacked? Here’s what to do

We hear about Facebook accounts getting hacked on a daily basis. With hackers dedicated to pounce on the slightest mistake made by a user, cases of Facebook accounts being compromised have become quite unavoidable. There are also instances of a friend or family member getting unauthorized access and misusing the information available. If your security […]