Tweet

Targeted Attacks, now using Android Malware.

In the past we have seen many targeted attacks on platforms line windows and Mac OS X. Now the cyber criminals who are making a targeted attack are using Android Malware. Generally in an email attachment we have seen that there is an infected doc, docx, xls, pdf file. But not there is an apk(…)

HTC One Overview.

HTC One Overview.

Recently I got a chance to get my hands on the yet to be released HTC One in an event hosted by HTC. I did not get a test device to bring home so I am unable to write a full review. But I will share whatever things I could test and whatever info I(…)

HTC One Meet-Up in Kolkata.

HTC One Meet-Up in Kolkata.

Today I was invited to the HTC One Meet-Up by HTC in Kolkata, Hyatt Regency. If you have been already following my live blog, or even you have not followed it, here is the full details post of the event. The event as mentioned before was held at a hotel in Kolkata, Hyatt Regency. The Android powered phone(…)

HTC One Meet-Up Kolkata (India) Live Blog.

HTC One Meet-Up Kolkata (India) Live Blog.

Today there is a event hosted by HTC at Hyatt Regency Kolkata, I am very much thankful to HTC for sending me the invite for HTC One Meet-up. I will be live blogging the event. And post event I will give a details write up about the HTC One phone (that’s if I get a(…)

Samsung Galaxy Note II security flaw.

Samsung Galaxy Note II security flaw.

A security flaw on Samsung Galaxy Note II has been discovered by Terence Eden that allows you to temporarily bypass the lock screen and have a peek at the users home screen, and lets you speed dial, if your finger has enough speed. Check out the video, to know more.  

How Google Search Works.

How Google Search Works.

Ever wondered how Google Search worked? Well now you can have a nice graphically represented answer to it, from Google itself.   Go to http://www.google.com/insidesearch/howsearchworks/thestory/    to see it in action.