Thursday, 28 November 2013

The Operating System of Android is being used by hundreds of millions of users around the globe. But, the Google has not engineered one of the most sophisticated OS regarding data security as it contributes huge in data leakage. According to the latest report obtained by the Public Intelligence, the U.S Department of Homeland and the Federal Bureau of Investigation (FBI) are fully aware of the threats imposed by the lack of security barriers in...

Wednesday, 27 November 2013

There is nothing in the world that is perfect and has no vulnerabilities. The situation is not much different regarding the Smartphone’s Operating Systems. No matter you use iOS, Windows Phone OS, Blackberry or android, all the Operating Systems have some weaknesses. Android has much weaknesses related to data security that is why the percentage of successful mal attacks against the OS is nearly as high as up to 80 percent. To overcome the data security...

Tuesday, 26 November 2013

Blackberry was the Operating System that used to rule the enterprise phone market like a king. But, the things have changed now and iOS and Android has become the new champions in the race of smartphone Operating systems. The trend of BYOD (Bring Your Own Device) has boosted the use of these Operating Systems and the culture of using Blackberry devices reduced. The use of the iPhone is reliable for the corporate use, but, it is near to impossible to...

Monday, 25 November 2013

IT experts have always warned the computer users to avoid using public wifi in order to maintain their data security. The principle does not only apply to the users who use a PC or Mac, but, the users who surf websites using Smartphone via unsecured wifi should also beware of the threat. Especially the users of Android when it was first released were strictly warned from using the unsecured wifi after a research that proved that the Google’s Operating System...

Tuesday, 19 November 2013

Hack attack is one of the worries for computer users that always haunt them. Hackers are such a genius species, but, they use their intelligence in the wrong manner. In order to prevent yourself from being a victim of such attack, below are some of the guidelines that can keep you safe. Beware of clicking alien links Usually, hackers trap their victim by pushing him or her towards clicking a link that is set by them and a single click on...

Monday, 18 November 2013

The Android Operating System that has the lion's share of nearly 80 percent of the market and the rest is shared by the other Operating Systems. In the last year of 2012 and the quarter of 2013, almost 187.4 million Android phones shipped; on the other hand only 31.2 million iPhones were shipped that is merely 13.2 percent of the market share. Windows Phone OS powered phones were the least to be delivered with just 8.7 million units that is 3.7...

Sunday, 17 November 2013

No matter what size of data you have, it is always on the target of cyber crooks to be attacked. Some months back in the current year, Yahoo Japan informed the users that they been hit by a hack attack in which they have compromised the information of about 22 million people. Earlier that incident Living Social an online daily dealing website revealed that unfortunately hackers have stolen the personal information of almost half a billion of the...

Tuesday, 12 November 2013

The best way you can defeat your enemy is to know their strength and weaknesses, their style of attack and tactics they use. The scenario is not much different in the case of the foes of your data. There is no doubt that hackers are the biggest enemy of your sensitive records, to protect your data from these e-crooks, you need to be aware of their tactics. Sniffer Sniffer is the technique through hackers tries to catch the packets during...

Monday, 11 November 2013

The trend of data breach is increasing significantly. The proof such increment in the information leakage incidents is the rise of almost hundred percent in a year as compared to 2011. The interesting fact is that, in the year of 2012, there were 2,644 cases if record breach that leaked nearly 267 million records as compared to the 412 million records that breached in 2011. There was an increase in the incidents of data breach, but, a massive decrease...

Sunday, 10 November 2013

Some days back, a scandal of data theft was reported in which a female employee of Barclays Bank stole the personal information of a customer from the bank’s database. It was later revealed that the employee were dating that customer and wanted to extract some personal information of his to know his marital status, number of children he has, address and other information. She took that man’s data and forwarded to one of her friends to keep it...

Wednesday, 6 November 2013

Internet scams have been around ever since the internet first came on to scene. Fraudsters with an internet connection are constantly finding new techniques to con unsuspecting innocent users, all thanks to the internet. In this guide, you’ll learn the various and most popular scams e-crooks use to steal your money and your identity. The Nigerian Millionaire Widow Scam: You receive an email from a young Nigerian widow who is in need of...

Tuesday, 5 November 2013

Is a Nexus Phone Running on KitKat Any Sweeter?

Posted by Tom Riddle | 21:27 Categories: , ,
There are so many devices based on Google’s Android operating system that it’s hard to keep track of them all. But each year Google works with a hardware maker to produce a “best of Android” phone and tablet, called the Nexus models, which are often used to launch a new version of the OS and to strip away the quirks and variations other makers and carriers layer on top of Android. I’ve been testing the latest of these Google-designed phones, the...
Apple Inc on Tuesday disclosed the number of information requests it received from governments around the world, making it one of the last big tech companies to do so in the wake of the controversy over data collection by U.S. national security agencies. In its report, which follows similar disclosures from Microsoft Corp, Google Inc, Facebook Inc and others, Apple signaled its opposition to U.S. government strictures on the type of data it is allowed to report, and called for more transparency in the process. From January 1 to June 30 this...
Saving data digitally has become extremely popular due to its portability. A hard drive can save terabytes of data, if you try to save a similar amount of data in compact disks, it may require thousands of CDs. On one side mobility of data in digital storage is the biggest reason of its popularity; it is also the biggest drawback of this technology. Information saved digitally is always at the aim of cyber criminals, and data stored on portable...

Monday, 4 November 2013

Data security is a growing concern for every computer user around the globe. Whenever you think of storing your personal sensitive data, the first thought that should pop up your mind must be regarding data its security. The records that you will not want to be breached at any cost are private photos and videos, financial information, business plans, marketing strategies and some other similar information. It is not much of a mystery that why an...

Friday, 1 November 2013

When the companies get unable in securing the personal information of their customers, those customers try to knock on the door of the court to get justice and compensation. But, it is not like a walk in garden to prove in the court that their records have been compromised by fault of the company. Whereas, it is extremely difficult to make the adjudicator to believe you are not guilty for losing your data. The statistics from the US Department...
  • RSS
  • Delicious
  • Digg
  • Facebook
  • Twitter
  • Linkedin
  • Youtube