by WhistleBlower | Oct 29, 2016 | Technology
Malware is the term that is coined a lot today. You will hear it quite often whose infection results in the compromised computer system up to the large network of a corporate systems. Also included in list the compromised smart mobile phones and emerging technology...
by WhistleBlower | Oct 28, 2016 | Technology
Malware Classification an Executive Overview The digital age of today demands executives to be aware of the growing concerns of Cyber Security; threats and business risks associated with it.This article is specially organized to provide the executive level overview...
by WhistleBlower | Oct 27, 2016 | Technology
In Android Permissions grant to application determine the application over all user impact. It not only decides the increase and confidence of user regarding the application working as per it claims but also put a vital questions regarding the stability and security...
by WhistleBlower | Oct 26, 2016 | Technology
The DDOS attack resulted the major disruption in service of major website around the world raised the questions regarding the stability of backbone internet service providers.The distributed denial-of-service (DDOS) attack targeted domain name service Dyn, who...
by WhistleBlower | Oct 26, 2016 | Technology
In our previous post “Android Permissions a Truth unfold”, we have discussed the ways how android permissions can cause a disrupt-able amount of damage to the user data,applications and devices.Let us see how permissions take effect and are enforced in...