With all the news of how NSA and other such agencies, and hackers too perhaps are checking on your online presence and activities every day, we thought...
According to the latest transparency report published by Google, in the month of September 2013, they have received the request to remove 21.5 million urls. Due to...
Evernote has now made its 2 step verification process, also known as Two Factor or Multi Factor Authentication, available to all the users. Other famous and recent...
Hackers are at it again, with the latest target being Adobe. The company announced the security breach yesterday. The attackers gained access to customer data and source...
When you spend more time on digital world than the world outside, the one aspect that one can never ignore or avoid under any circumstances is Security....
Vodafone in Germany was hacked and the hacker gained access to 2 million customers’ personal details. The company took the necessary steps to stop the attack as...
Mobile security firm Lookout has partnered with Samsung, specifically the Samsung KNOX devices. Samsung KNOX devices are especially designed keeping in mind the security of the mobile...
RSA acquired a San-Francisco based security firm named PassBan yesterday. RSA, being one of the most reputed computer and Network Security firm understands the challenges faced by...
A new Zero-Day exploit (vulnerability) was uncovered in IE 8 by security experts which allow hackers to gain access in to Windows Operating Systems. Microsoft said they...
Twitter is reportedly working on two-factor authentication system. The rumor may hold considerable amount of truth to it owing to the recent incident where the Associated Press...
With the technology advancements today, online security is proving to the one of the most important aspects of any business. Five years ago maybe, it would have...
Cloud Computing has transformed the way IT performs, it has changed the way IT services are created, managed, performed and outsourced. It is a new dimension in...
The company following the trend of BYOD allows its employees to not only bring their personal devices like Mobile Phone, Laptops, Tablets to work, but also use...
Aren’t we all a little wary today, hesitating a little bit while giving our personal information when signing up for a social networking site? This scenario never...