Huawei Honor Holly
Huawei Honor 6
Oplus XonPhone 5
Xiaomi Redmi 1S
Asus Zenfone 6
Asus Zenfone 5
HTC One (M8)
Analysis: Sony Xperia Z3 camera capability and image quality
How to shop smarter online to get best prices, discounts
Xiaomi Redmi 1S tested after OTA update
iPhone 6 Plus vs Galaxy Note 4 vs Nexus 6: Specs Comparison
SignEasy lets you sign documents digitally on your phone or tablet
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
Indian Air Force asks personnel not to use Xiaomi phones
Apple issues security warning for iCloud
Intex Aqua Amaze octa-core smartphone launched at Rs. 10,690
Microsoft releases first update to its Windows 10 Technical Preview
Philips Aurora i966 with 5.5-inch QHD display, 3GB RAM unveiled
Moto G 2nd gen launched, available from midnight at Rs. 12,999
Xiaomi goes for the kill, prices Redmi 1S at Rs. 5,999 in India
Xiaomi lists Mi3 cases and power-banks on Flipkart, offers 10,400 mAh powerbank for Rs. 999
Moto G2 expected to be announced on 10 September
Motorola Moto X (Gen 2) smartphone, Moto 360 smartwatch announced for India
Dell Inspiron 3542
Acer Aspire E1-572
ASUS Zenbook UX302LG
Lenovo Yoga Tablet 2 Pro
Lenovo Yoga Tablet 2 10.1 Windows
Overview: Implementing fast real-time GPU-based image blur algorithms
How to use Intel Perceptual Computing SDK for human-robot interface
How to use touch gestures to Influence Physics Parameters using TouchScript
Case Study: How to adapt multiple input methods on Intel based hybrid devices
How to fix Nexus 4 power button issue
How to get started with OpenCL on Android OS
How to use Intel Cilk Plus to speed up your Android application
Tutorial: How to implement H.265/HEVC for Intel Atom Based Android Platforms
How to implement Gesture Sequences in Unity 3D game engine via TouchScript framework
How to use Native Library Compression SDK for Android apps
Digit News Update [21 Oct 2014]
Digit News Update [20 OCT 2014]
Pentax K-500 Camera Review
Lenovo launches Yoga 2 series tablets
Apple unveils ipad air 2 and the ipad mini 3
Best online deals to look out for today
5 apps to get the Android Lollipop look on your smartphone
Top 10 value for money phones to buy from 6K to 20K
Apple iPad Air 2 vs. Google Nexus 9: Specs comparison
Lenovo Yoga 2 tablets: Hands on
Google reveals some interesting facts about its measures taken to secure users' accounts and privacy.
Google has announced its “war against account hijackers” campaign has helped reducing account hacking by 99.7 percent since the launch of the initiative.
Google in a blog post said, scams, illegal, fraudulent or spam messages often come a person's own contacts. Though only 1 percent of that spam shows up in the inbox, spammers have of late started targeting hijacking accounts. Moreover, spammers have now become “account thieves” sneaking into databases to steal usernames, passwords and online elements of the accounts.
“With stolen passwords in hand, attackers attempt to break into accounts across the web and across many different services. We’ve seen a single attacker using stolen passwords to attempt to break into a million different Google accounts every single day, for weeks at a time,” says Google in the blog.
“A different gang attempted sign-ins at a rate of more than 100 accounts per second. Other services are often more vulnerable to this type of attack, but when someone tries to log into your Google Account, our security system does more than just check that a password is correct.”
Google also explains how its Security tools help users protect their account. Every time a user signs into Google via web or another platform that checks for new mail every five minutes, Google's system conducts a complex risk analysis to determine how likely is that sign-in has come from the valid users. Google uses more than 120 variables to make a decision.
“If a sign-in is deemed suspicious or risky for some reason—maybe it’s coming from a country oceans away from your last sign-in—we ask some simple questions about your account. For example, we may ask for the phone number associated with your account, or for the answer to your security question,” adds Google.
“These questions are normally hard for a hijacker to solve, but are easy for the real owner. Using security measures like these, we've dramatically reduced the number of compromised accounts by 99.7 percent since the peak of these hijacking attempts in 2011.”