Cross-Platform Malware: A Growing Threat For Computers

21 November 2013

There is a new threat in town when it comes to malware; it attacks without prejudice and it’s got cross-platform power. The same strain of a particular malware and virus, if it has cross-platform ability, can hit multiple OS such as Windows, Mac and Linux etc., simultaneously. It is exceedingly harmful because it has the [...]

NSA’s Computer & Mobile Spying: An Interview with Tung Yin

NSA’s Computer & Mobile Spying: An Interview with Tung Yin

26 November 2013

Tung Yin is a professor of law at Lewis & Clark Law School in Portland, Oregon. His main area of focus is national security law, criminal procedure, terrorism and law, and federal criminal law. He has conducted extensive research on domestic legal problems that were borne from counter-terrorism practices and policies in the aftermath of [...]

Read the full story

Posted in UncategorizedComments (0)

NSA: From Security Provider To Cell Phone Tracker

NSA: From Security Provider To Cell Phone Tracker

21 August 2013

Cell phone tracker and spy software have been traditionally associated with hackers, malware, Trojans and what not. However, in light of the NSA blowout we’re now finding that tracking is something even the government is involved in. According to reports the National Security Agency (NSA) has been spying on US citizens all in the name [...]

Read the full story

Posted in InfographicsComments (0)

The ultimate keylogger: FBI’s Magic Lantern

The ultimate keylogger: FBI’s Magic Lantern

19 July 2013

While keyloggers maybe popularly associated with hackers and identity thieves in the digital realm, they have one more master that we often overlook i.e. the FBI. The Magic Lantern was a special program which used tricks only known to black hat hackers. It infiltrates a target’s system and steals all kinds of data. This infographic [...]

Read the full story

Posted in InfographicsComments (0)

Dissecting Cyberbullying: An Interview with Dr. Justin W. Patchin

Dissecting Cyberbullying: An Interview with Dr. Justin W. Patchin

26 April 2013

Cyberbullying is a significant problem that can be stopped in its tracks if the right kind of actions are taken at the right time. It is a form of violence where the perpetrator doesn’t realize the magnitude of the damage they’re doing, and the victim has troubling finding their voice to speak against it. Cyberbullying [...]

Read the full story

Posted in UncategorizedComments (0)

Alarming Facebook Misuse Stats

Alarming Facebook Misuse Stats

23 April 2013

Facebook is booming and business has never been better for the social media giant. However, it’s proliferation in the last few years has resulted in some unintended and unwanted consequences. The alarming numbers on Facebook are on the rise and further climbing. Be it a teen or an employee – effort is needed to ensure [...]

Read the full story

Posted in InfographicsComments (0)

Text Messaging Habits We All Hate

Text Messaging Habits We All Hate

14 March 2013

All of us know at least one person who sends long boring text messages; a couple that refuses to stop texting no matter who’s around; people who respond after ages with a “K”; then there are those that text you absolute gibberish because they’re “too cool for school”; and of course anger management cases that [...]

Read the full story

Posted in InfographicsComments (0)

Cell phone & Web: The Perfect Valentine’s Day Cupids!

Cell phone & Web: The Perfect Valentine’s Day Cupids!

29 January 2013

Valentine’s Day is right around the corner and cupid won’t come to your rescue if you forget till the last minute. Technology can help you up your game with searches that land everything you need at the tip of your fingers. From gifts to the perfect meal, you can’t go wrong with a cell phone [...]

Read the full story

Posted in InfographicsComments (4)

The grinch who stole data

The grinch who stole data

05 December 2012

We are all but too familiar with the nasty Grinchs out there that are eying the prize by plotting to steal precious data off our system through hacking, malware, keylogger software, backdoor exploits etc. Let’s take a look at how data was attacked by one nasty Grinch after the other in 2012, and how it [...]

Read the full story

Posted in InfographicsComments (5)

1 2 3 12