Cross-Platform Malware: A Growing Threat For Computers

21 November 2013

There is a new threat in town when it comes to malware; it attacks without prejudice and it’s got cross-platform power. The same strain of a particular malware and virus, if it has cross-platform ability, can hit multiple OS such as Windows, Mac and Linux etc., simultaneously. It is exceedingly harmful because it has the [...]

Cyberbullying: After School App Gets The Boot

Cyberbullying: After School App Gets The Boot

19 December 2014

With each new day we have some developer or the other coming up with a new app that is targeted at youngster. Most recently, the trend has been targeting tweens and teens at an increasing rate. “After School” was one more app that aimed to tap into the market through kids. However, it took only [...]

Read the full story

Posted in Parental ControlComments (0)

Security Apps Which Can Help Keep Your Phone Safe

Security Apps Which Can Help Keep Your Phone Safe

17 December 2014

A plethora of security applications are available which were created just for you to keep mobile phones and private data safe from malware, snooping apps and thieves, all of which want access to personal information. When looking for mobile security apps, the following are things to consider: Keeping quality protected: despite there being real threats; [...]

Read the full story

Posted in Cell Phone TrackingComments (0)

Android Devices Available At Bargains May Have Security Vulnerabilities

Android Devices Available At Bargains May Have Security Vulnerabilities

15 December 2014

This Black Friday, a large number of retailers are willing to give customers amazing deals on smart phones and tablets this year. Not all products offered however are safe for buyers to purchase according to a research which was conducted by a security company called the Bluebox Labs. While these Android tablets may be cheaper, [...]

Read the full story

Posted in UncategorizedComments (0)

Web Woes: What Are Trusted Websites?

Web Woes: What Are Trusted Websites?

12 December 2014

In many cases scammers and hackers have now upped the ante on their operations and do a fairly great job of making sure that their exploits look like the real deal. So how do you tell what is good and what is bad? While some people in the digital world are a little bit tech [...]

Read the full story

Posted in Computer MonitoringComments (0)

How to Keep Your Cell Phone Secure

How to Keep Your Cell Phone Secure

10 December 2014

Our smart phones are more or less extensions of us. It wouldn’t be a stretch to say that the average phone knows more about a person than any actual human being that holds them near and dear. From work schedules to the places they like to frequent for food to the beaches they went for [...]

Read the full story

Posted in Cell Phone TrackingComments (0)

Tor: Not that hard to crack

Tor: Not that hard to crack

08 December 2014

US and European police recently arrested 17 people and shut down over 400 online contraband operations that they thought remained hidden by Tor. For those of you who don’t know, Tor is a browser that lets people get a taste of the virtual world without having to deal with censorship online, and they can stay [...]

Read the full story

Posted in Computer MonitoringComments (0)

Mobile Payments to Get Security Reboot with iWatch

Mobile Payments to Get Security Reboot with iWatch

05 December 2014

Rumor has it that Apple is going to be upping the ante on the iWatch in ways that will make it the hottest thing to hit the market in 2014 and the next year. In the world of smartphones and tablets it was only going to be a short while before we moved onto other [...]

Read the full story

Posted in UncategorizedComments (0)

Facebook’s “Moments” Could Be an Answer to Our Privacy Woes

Facebook’s “Moments” Could Be an Answer to Our Privacy Woes

03 December 2014

An app that lets you share things in the most private manner possible? Well it seems like there’s finally an app for that. Facebook has become notorious for not giving much of a thought to its increasingly open nature. Something that its users have griped about time and again. However, in the most recent news [...]

Read the full story

Posted in UncategorizedComments (0)

1 2 3 17