Let’s get one thing straight: it’s no longer possible to deny that your life in the physical world and your digital life are one and the same. Meaning, while you are present here on the ground, you also exist online, whether you know it or like it or not. Coming to terms with this reality ...
Read Blog
Mobile security is a topic I return to again and again and why not? Considering the proliferation of smartphone among the urban population of India and the demand for the same even in rural outbacks with poor internet connectivity, it is imperative to remind ourselves that along with all the advantages (and there are many) ...
Read Blog
Location-based services utilize geo-location information to publish your whereabouts. In some cases, these services can also provide discounts or freebies as a reward for “checking in” at participating businesses and gathering “points.” These services can also be used to share photos and other media in real-time with your friends and followers. Geo-location or geo-tagging can ...
Read Blog
Let me begin with a confession. I am addicted to shopping. Nothing lifts off those blues faster than a purchasing spree across several of my favourite stores. And not only for myself or my family- I am happy to accompany others too on their shopping spree; like for my cousin’s trousseau, my sister’s kid’s birthday ...
Read Blog
“SMiShing” is a silly word—even sillier than “phishing,” but equally dangerous. Phishing occurs when scammers send emails that appear to have been sent by legitimate, trusted organizations in order to lure recipients into clicking links and entering login data and other credentials. The term is a reference to the scammers’ strategy of luring the victim ...
Read Blog
McAfee and Ponemon Institute recently released “The Lost Smartphone Problem,” a study that attempts to determine how many employees’ smartphones are lost or stolen, and the consequences of these lost cell phones on various organizations. Among the 439 sample organizations, the number of missing smartphones is significant: 142,708 in one year. Approximately 62% of smartphones ...
Read Blog
It is truly said that the world is growing smaller. And emails are one way which has helped us to communicate with our loved ones. They allow us to stay in touch with people all across the world and forwards are a wonderful way of indicating, ‘I remember you’. We forward jokes, amazing pics, philosophical ...
Read Blog
Have you ever bitten into an apple and found a worm? I have, and it’s yummy! Anyway, how many times have you heard, or even said, “I won’t get that computer virus because I have a Mac”?  While Mac users tend to feel somewhat insulated from viruses, it’s time for anyone who owns an Apple ...
Read Blog
1. Realize that you can become a victim at any time. Not a day goes by when we don’t hear about a new hack. With 55,000 new pieces of malware a day, security never sleeps. 2. Think before you post. Status updates, photos, and comments can reveal more about you than you intended to disclose. ...
Read Blog