by WhistleBlower | Nov 3, 2016 | Technology
Ever wondered about the scenario where you are asking computer to make the beautiful artworks for you. All by it self it produces the beautiful symphony , a wondrous piece of text or a splendid video. We are going to talk about the recent advancement by Google, in...
by WhistleBlower | Nov 2, 2016 | Technology
As Smart Phones are becoming the growing Future of the handheld devices, so does the threats that are associated with them. This is third article of a series where we some what try to cover a systematic characterization of existing Android malware, ranging from their...
by WhistleBlower | Nov 1, 2016 | Technology
As Smart Phones are becoming the growing Future of the handheld devices, so does the threats that are associated with them. This is second article of a series where we some what try to cover a systematic characterization of existing Android malware, ranging from their...
by WhistleBlower | Oct 31, 2016 | Technology
As Smart Phones are becoming the growing Future of the handheld devices, so does the threats that are associated with them. This article some what tries to cover a systematic characterization of existing Android malware, ranging from their installation, activation, to...
by WhistleBlower | Oct 30, 2016 | Technology
The article gives an overview of the techniques most commonly used in the malware spread. Some times it is also termed as infection vectors that are commonly used by malicious software to infect a victim’s system. Brief examples re-used to illustrate how these...