Android Malware Installation Tactics

Android Malware Installation Tactics

As Smart Phones are becoming the growing Future of the handheld devices, so does the threats that are associated with them. This article some what tries to cover a systematic characterization of existing Android malware, ranging from their installation, activation, to...
How Malware Spreads

How Malware Spreads

The article gives an overview of the techniques most commonly used in the malware spread. Some times it is also termed as infection vectors that are commonly used by malicious software to infect a victim’s system. Brief examples re-used to illustrate how these...
Essential Executive overview of Malware

Essential Executive overview of Malware

Malware Classification an Executive Overview The digital age of today demands executives to be aware of the growing concerns of Cyber Security; threats and business risks associated with it.This article is specially organized to provide the executive level  overview...
Android Permissions Common Developer Mistakes

Android Permissions Common Developer Mistakes

In Android Permissions grant to application determine the application over all user impact. It not only decides the increase and confidence of user regarding the application working as per it claims but also put a vital questions regarding the stability and security...