Computer viruses and Trojan originate from some primordial forms of malware which, through the years, have evolved into a more sophisticated structure in keeping with the modifications that anti-malware products take. But if two powerful Trojans join forces, that is where the difference lies.
Blog
Celebrating Father’s Day – What Tech Gifts you should buy for your Dad?
Disclosure: My blog post was written as part of my collaboration with eBay. Father’s Day is around the corner and it’s time to prepare gifts for our belove dads. Most people find this a difficult challenge but in my own experience, it is not.
WordPress accounts vulnerable to hacking due to unencrypted cookies
There was a recent report on a vulnerability with cookies that should raise the alarm for WordPress users like me who compose blog posts and articles using this blogging platform.
A new wearable Smash helps you become a tennis pro
Smash a wearable bracelet for tennis players allows them to record their movements and review them afterward on the Android or iPhone App. Currently Smash is in the prototype stage and requires a large sum of $200,000 AUD over the next month and a half. Smash founder Rob Crowder says that level of funding is […]
Can IBM detect fraudulent hackers with its new cognitive tool?
IBM is looking into a technology that can help detect and identify a fraudulent access of personal data stolen from its legitimate owner. The cognitive fraud detection system is especially useful to website developers and cloud providers that maintain logins and network access on a daily basis.
Google to phase out third-party add-ons for Chrome
In a far-reaching move to ensure that browser plug-ins and extensions finding their way into the Chrome world, Google reiterated and bolstered its plan to phase out third-party add-ons that do not comply with its goal.