by WhistleBlower | Oct 31, 2016 | Technology
As Smart Phones are becoming the growing Future of the handheld devices, so does the threats that are associated with them. This article some what tries to cover a systematic characterization of existing Android malware, ranging from their installation, activation, to...
by WhistleBlower | Oct 30, 2016 | Technology
The article gives an overview of the techniques most commonly used in the malware spread. Some times it is also termed as infection vectors that are commonly used by malicious software to infect a victim’s system. Brief examples re-used to illustrate how these...
by WhistleBlower | Oct 29, 2016 | Technology
Malware is the term that is coined a lot today. You will hear it quite often whose infection results in the compromised computer system up to the large network of a corporate systems. Also included in list the compromised smart mobile phones and emerging technology...
by WhistleBlower | Oct 28, 2016 | Technology
Malware Classification an Executive Overview The digital age of today demands executives to be aware of the growing concerns of Cyber Security; threats and business risks associated with it.This article is specially organized to provide the executive level overview...
by WhistleBlower | Oct 27, 2016 | Technology
In Android Permissions grant to application determine the application over all user impact. It not only decides the increase and confidence of user regarding the application working as per it claims but also put a vital questions regarding the stability and security...