If you have been into social networking for the last couple of years, you might have noticed a surge in the frequency of what appears to be fake accounts in Facebook and Twitter.
Russian Hackers Steal Data using Twitter and Coded Images
A gang of hackers believed to be coming from Russia has been responsible for a number of attacks on many computers that resulted in the loss of several data, according to a report from security vendor FireEye.
Yahoo creates new mobile niche with combined video and texting app
A new and innovative product has come off the development lab of Yahoo, and it’s geared toward creating an entirely fresh niche in mobile offerings, something that mobile users have never seen before.
Will Windows 10 Mobile Save Microsoft?
Microsoft is all set to introduce the Windows 10 Mobile ecosystem to users of the Windows Phone suite of mobile devices and even non Windows Phone users alike. The move is seen by many analysts as a late response to the sustained dominion of Android and iOS devices.
Is endpoint security more complicated than how antivirus works?
Between endpoint security and antivirus software, there is a world of difference in how each works. But which task is more complicated?
Can Digital Watermarking Help in Locating Stolen Data?
Surveillance devices have grown in adoption as connected devices such as mobile phones, computers and industrial equipment become more communicable at the speed of sound.