Our Blog

Latest from IT, Digital and Daily Life

Top 20 Android Permissions that a Malware can request

Top 20 Android Permissions that a Malware can request

Top 20 Android Permissions that a Malware can request While using your Android applications that are developed by various vendors, The most important thing on which the user which is installing that app on device ponders are the APP Permissions. The Android App...

Self Learning Digital Artist

Self Learning Digital Artist

Ever wondered about the scenario where you are asking computer to make the beautiful artworks for you. All by it self it produces the beautiful symphony , a wondrous piece of text or a splendid video. We are going to talk about the recent advancement by Google, in...

Android malware Payloads and Permission Use

Android malware Payloads and Permission Use

As Smart Phones are becoming the growing Future of the handheld devices, so does the threats that are associated with them. This is third article of a series where we some what try to cover a systematic characterization of existing Android malware, ranging from their...

Android malware ActivationTactics

Android malware ActivationTactics

As Smart Phones are becoming the growing Future of the handheld devices, so does the threats that are associated with them. This is second article of a series where we some what try to cover a systematic characterization of existing Android malware, ranging from their...

Android Malware Installation Tactics

Android Malware Installation Tactics

As Smart Phones are becoming the growing Future of the handheld devices, so does the threats that are associated with them. This article some what tries to cover a systematic characterization of existing Android malware, ranging from their installation, activation, to...

How Malware Spreads

How Malware Spreads

The article gives an overview of the techniques most commonly used in the malware spread. Some times it is also termed as infection vectors that are commonly used by malicious software to infect a victim’s system. Brief examples re-used to illustrate how these...

Let's Work Together!

Whether you are a small business or startup looking to establish digital footprint OR custom solutions. We can work with you to achieve that.