by WhistleBlower | Oct 7, 2019 | Technology
Companies like Google, Microsoft, Yahoo and many other are consistently forcing the use of HTTPS by web sites to secure the web traffic and preventing the attackers from hijacking the data transfered from end user’s browser to the website. But it appears that...
by WhistleBlower | Nov 5, 2016 | Technology
Defenses against pay per install malware In Today’s fast growing internet the threat regarding the exploited services resulting loss in terms of money and services is increasing a lot . One of the avenue of posing this kind of threat are pay-per-install . This...
by WhistleBlower | Nov 4, 2016 | Technology
Top 20 Android Permissions that a Malware can request While using your Android applications that are developed by various vendors, The most important thing on which the user which is installing that app on device ponders are the APP Permissions. The Android App...
by WhistleBlower | Nov 2, 2016 | Technology
As Smart Phones are becoming the growing Future of the handheld devices, so does the threats that are associated with them. This is third article of a series where we some what try to cover a systematic characterization of existing Android malware, ranging from their...
by WhistleBlower | Nov 1, 2016 | Technology
As Smart Phones are becoming the growing Future of the handheld devices, so does the threats that are associated with them. This is second article of a series where we some what try to cover a systematic characterization of existing Android malware, ranging from their...