Imagine all your conversations being heard by your laptop while you are on phone or interacting with a person near your laptop. A major security revelation by a security researcher in Google’s We Browser. Chrome Bug Permits sites to have an eye on you by discreetly recording Audio/Video Chrome is one of the most extensively
Blog
All of you must be accustomed with the registry settings which are available in the operating system. A little hands on with those settings lets you to customize your OS in an entirely different manner. But you have to be very cautious while playing with these settings. A small fault while tweaking with the registry
With increasing number of cybercrime despite of constant reminders and awareness has urged to come with this write up. If you think just knowing computers is enough to sustain in this cyber growing world then probably you are wrong. The CEO’s, the giant’s IT firms, the security analyst in fact even a smart hacker is
Be Aware! Your witless acts can cause you a life’s threat. Plugging your phones to public charging stations or computers at railways stations, bus stands etc. using USB cables makes your phone vulnerable to hackers. Not even every USB cable in the market is genuine and poses the possibility of data theft while charging. USB
In case of a malware attack or forgetting your android smartphone password, the thought which strikes our mind is of a factory reset. With this we get rid of the above annoying situations but it also eliminates all our installed applications from our phone and we need to start the entire procedure again installing
We live in the ‘Information Age’. There is an abundance of information freely flowing and easily available for access. Computers, mobile phones, digital cameras and other electronic gadgets have become an inseparable part of our daily lives. On the other hand, anonymity, lack of defined boundaries and restrictions of information access, and a growing dependency
What is Malware? Malware or Virus is another term for a malicious programme. It performs unwanted actions on the computer which include Intentional programme crashes Unwanted pop-ups Stealing user confidential data Destruction of data or hardware Based on their characteristics, we can classify them into categories such as Worm Trojan Keylogger What is a Worm?
IoT Device and Hack This recent increase in IoT devices have proved mindboggling challenge to cyber world. No doubt IoT devices has significantly eased our life. The smart refrigerator tells you when the milk is over, available veggies. Adding to this here are some of the noteworthy IoT devices. August doorbell camp: this small doorbell
What is Internet time/Bandwidth theft? Internet time/ bandwidth theft is a crime where the internet connection of one person (the victim) is used by an unauthorised person (the criminal). This is usually done by getting access to the user’s internet account details, such as user name and password, provided by the service provider. This access
To transfer data between your PC and android phone, the procedure is quite straightforward. All you require is an Android Smartphone and a Personal Computer connected to an identical Wi-Fi network. Thereafter, you’ll be able to browse and transfer files from your phone and computer through High-speed data rate. Go ahead with the following