How to Safely Connect to Public, Free Wi-Fi

How to Safely Connect to Public, Free Wi-Fi

The word FREE is enticing. It just enlightens our mind with happiness, and more so when it’s about the Internet. Eventually, you figure out a way to get something done. But then, things which are free, aren’t safe. Well, most of the time at least. Depending on the country and city you live in, you most probably have at least […]

     
 
 

Report Reveals Android had the Most Security Vulnerabilities in 2016

Report Reveals Android had the Most Security Vulnerabilities in 2016

Android had a pretty disastrous last year if we talk about security. Millions of devices were exploited by various malware including Rowhammer, Quadrooter, Stagefright, Qualcomm “god mode” bug and a few more. Now, a new report has accentuated the slump period with some numbers which reveal Google’s mobile OS topped the vulnerabilities charts in 2016, followed by Debian and Ubuntu […]

     
 
 

Synaptics’ new Fusion Engine can Handle Both Fingerprint and Facial Biometrics

Synaptics’ new Fusion Engine can Handle Both Fingerprint and Facial Biometrics

Biometric authentication on mobile devices is gradually getting mainstream. We saw numerous OEMs release budget devices with fingerprint scanners in 2016. Although, as these technologies continue to evolve, a comprehensive system was utterly required. Discerning the need for such, Synaptics has announced a new engine for smartphones, tablets and notebook PCs which will allow authentication from multiple biometric sensors. Developed […]

     
 
 

Nope 2.0 is a Tiny Magnetic Shield Aimed at Securing Your Webcam

Nope 2.0 is a Tiny Magnetic Shield Aimed at Securing Your Webcam    

It was only a while ago that the creator of Facebook, Mark Zuckerberg was seen with his personal laptop that had been taped on a microphone and the webcam lens. While some might dismiss this as being paranoid the truth is it is one of the basic security measure. Hackers have earlier accessed many devices with the help of Trojans […]

     
 
 

The Best 5 Anti-Malware Tools for Mac OS to Enhance Protection

The Best 5 Anti-Malware Tools for Mac OS to Enhance Protection

Security wise, the Mac OS is considered more secure than Windows will ever be, and that’s something that has to do with the mode in which the platform itself has been written, and maintained. For instance, both platforms offer software updates that fix loop-holes and cracks into the surface, but those delivered onto the Mac OS platform are more comprehensive, […]

 
     
 
 

5 End-to-end Encrypted Messenger Apps That You Should Try

5 End-to-end Encrypted Messenger Apps That You Should Try

Over the past couple of years, specially after Edward Snowden revelations, people have started to take privacy and security a little more seriously. Since then, several popular instant messaging apps like WhatsApp, Telegram, Apple’s iMessage and more recently Line have endorsed End-to-end encryption in order to ensure that any communication through the app is transmitted safely without being interrupted by […]

     
 
 

Network Vulnerability Allows Anyone from Anywhere in the World to Eavesdrop on Your Calls and Track Location

Network Vulnerability Allows Anyone from Anywhere in the World to Eavesdrop on Your Calls and Track Location

Cellphones in general and smartphones in particular have become the treasure trove of personal information and this is increasingly attracting the hackers attention. The data in cellphone speaks so much about the individual that it can be admitted as one of the most comprehensive set of information you could probably scrape off a person. Aussie based TV program, “60 minutes”, […]

     
 
 

Crazy! Most Android Phones can be Hacked with a Simple MMS

Crazy! Most Android Phones can be Hacked with a Simple MMS

Security expert Joshua Drake, vice president of platform research and exploitation at mobile security firm Zimperium has developed an exploit which can hack virtually any Android phone out there just by sending a slightly modified multimedia message (MMS). According to Drake, for the exploit to work you only to know the victim’s phone number. The vulnerabilities were found in a core Android component called Stagefright, […]