• This New Year, Learn some tips to keep your information secure online!

    Online security has become a hot issue this Christmas. With news of the recent Sony hacking scandal, a lot of people are questioning whether there is anything more they can do to keep their online information safe. The internet is constantly becoming a bigger part of our lives, with almost…

  • Celebrity nudes hacked; Apple denies to accept the blame; What this means to you?

    And the last long weekend was not good for the famous women around! There was a massive online leak of alleged personal pictures pulled from the iCloud. The hacked celebrity list include Jennifer Lawrence, Kate Upton, Selena Gomez, Rihanna, Lea Michele, Kirstin Dunst, Avril Lavigne and many others. While some of the pictures are authentic(identified…

  • How safe are you in the Cloud? – Few Tips to Protect your critical data

    It is pretty tough to imagine today’s information technology without the cloud storage. It has come to a time where even little children have their own online storage spaces to store their school materials. Therefore, it is needless to say that businesses use cloud storage generously. A majority of these…

  • Microsoft’s Xbox Kinect to protect Korean Border

    Xbox Kinect is the one device that every household of a gamer has (or at least in the wish-list.) The Kinect sensor is supposedly one of them most efficient and convenient implemented technology that allows you to play hands-free. This movement-recognition software developed by Microsoft doesn’t seem to only attract…

  • “Your data can be viewed by third party”, says Barrack Obama

    The NSA are hitting headlines with their activity and it looks like they won’t stop at nothing. They want everything. From where you live to how you were born, they need all these personal details. The NSA (National Security Agency), according to Wikipedia, is the main producer and processor of…

  • Silent Circle and Geeksphone partner to produce Blackphone that aims for more security!

    Wanted to have a mobile that puts privacy and control at first place?! Here is good news for you from Silent Circle and Geeksphone, who have partnered to produce and offer you PrivatOS which is an Android based operating system. The device is termed  – Blackphone and this will be “the world’s…

  • Pulling at the Heart Strings: Phishing Gets Emotional

    A week before Christmas of 2013, hackers stole financial information from 40 million Target customers. As soon as the retail giant discovered the security breach, Target sent its customers an email explaining the situation. Within twenty-four hours, according to MarketWatch, phishers jumped into the madness with a phishing email. Designed…

  • Will 2014 be the Year of Mobile Device Security?

    What kind of security prevails in your mobile? You have facilities to unlock your screen using a password, a PIN, a pattern. Some mobile devices have gone ahead to rely on the front camera’s resolution to enable user photo authentication. (Although this feature is not as secure as the other…

  • Which Sites follow Best practices to Encrypt Your Online Data? [Infographic]

    Why is encryption so important?! The internet is vulnerable and by enabling various encryption technologies, the service providers can make backdoor surveillance and hacking a more challenging task! For every website it is better to start encryption with the Hypertext Transfer Protocol Secure (HTTPS) by default. By doing this, whenever a user…

  • Torrent Download of GTA V? Beware! Its Malware!

    GTA V is an excellent game and yes the game created a sensation. But its really sad that the PC version is not available yet. So what can people do? Just play the game online?! Yeah, thats a good alternate, but its not enough for us and we can confirm…

  • Headset with built-in EEG can Authenticate you by your Thoughts – ‘Passthoughts’

    We often forget passwords! Just think of the situation if the forget password service is not present! OMG! Much is discussed about the traditional password and now other alternatives are looked upon like the One Ring from Google. Although many type of biometric sensors have come up, researchers from UC…

  • Hacker gets full access to facebook user profiles due to security flaw

    The developer, Nir Goldshlager, has found a security flaw in Facebook that could have allowed real hackers get into the full Facebook user profiles. Facebook users don’t get panic. Facebook has already fixed the issue. Developer Nir Goldshlager has written a blog post on how he managed to find out this security flaw in Facebook….

  • Facebook will be closed for maintenance between Feb 29-31 – Hoax

    Messages have been spreading on Facebook that the social network will be closed between February 29th and February 31st, 2013. May be its true as you won’t be able to log into Facebook (or even Twitter) on February 29th, February 30th or February 31st this year.   Apparently comical as these…

  • Ticketmaster slashes CAPTCHA for Non-User Friendly

    The world’s biggest online retailer TicketMaster dumped CAPTCHA to make their service more user friendly. According to the reports, the company will anti-spamming system developed by Solve Media. Ticketmaster claims that CAPTCHA shows up nonsensical words that are hard to make out. Instead the new anti-bot of ticketmaster presents, questions…

  • One Ring to Rule Them All: USB Jewelry to Replace Passwords?

    The average internet user has 25 online accounts and 6.5 different passwords, according to Microsoft data. It’s nearly impossible to track the number of scammers and victims online, but it seems to be in the bagillions. Citizens are getting our identities stolen, our online bank accounts accessed, and our lives…

  • Microsoft Internet Explorer flaw – your cursor movements can be tracked even if browser is minimised!

    A new Internet Explorer vulnerability has been discovered which could be used by an attacker to track your mouse cursor anywhere on the screen, even if the browser isn’t being actively used. This security hole was discovered by the spider.io and was disclosed to Microsoft. Even-though Microsoft Security Research Center has acknowledged…

  • Are you updating your tweets by SMS? Wait you are vulnerable!

    Anyone could tweet in your name by just knowing your mobile number which is associated with the Twitter account!.And you would know and never will be alerted too! Seems very straight forward isn’t it? A team of security researchers have discovered this security hole. Same was found with sites like Facebook and…