by WhistleBlower | Nov 2, 2016 | Technology
As Smart Phones are becoming the growing Future of the handheld devices, so does the threats that are associated with them. This is third article of a series where we some what try to cover a systematic characterization of existing Android malware, ranging from their...
by WhistleBlower | Nov 1, 2016 | Technology
As Smart Phones are becoming the growing Future of the handheld devices, so does the threats that are associated with them. This is second article of a series where we some what try to cover a systematic characterization of existing Android malware, ranging from their...
by WhistleBlower | Oct 31, 2016 | Technology
As Smart Phones are becoming the growing Future of the handheld devices, so does the threats that are associated with them. This article some what tries to cover a systematic characterization of existing Android malware, ranging from their installation, activation, to...
by WhistleBlower | Oct 30, 2016 | Technology
The article gives an overview of the techniques most commonly used in the malware spread. Some times it is also termed as infection vectors that are commonly used by malicious software to infect a victim’s system. Brief examples re-used to illustrate how these...
by WhistleBlower | Oct 29, 2016 | Technology
Malware is the term that is coined a lot today. You will hear it quite often whose infection results in the compromised computer system up to the large network of a corporate systems. Also included in list the compromised smart mobile phones and emerging technology...
by WhistleBlower | Oct 28, 2016 | Technology
Malware Classification an Executive Overview The digital age of today demands executives to be aware of the growing concerns of Cyber Security; threats and business risks associated with it.This article is specially organized to provide the executive level overview...