Xiaomi Redmi 1S
HTC One E8
Idea 3G Smartfone Ultra +
WickedLeak Wammy Neo
Asus Zenfone 6
Asus Zenfone 5
HTC One (M8)
HTC Desire 616 Dual SIM
First Impression: Intel powered Digiflip Pro Android tablets from Flipkart
First Impressions: Xiaomi Redmi 1S, redefining the low-end segment
MyUniverse App: A smarter way to manage finances
First impression: Using the Mozilla Firefox OS on the Intex Cloud FX phone
Xiaomi Redmi 1S: 6 things you should know about the budget Android phone
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
Xiaomi halts sales of the Mi 3 in India
Coolest Cooler becomes the top-funded campaign on Kickstarter
Samsung Gear S with curved screen, Tizen OS and 3G announced
RCom readies for USSD-based mobile banking service
Twitter releases Analytics dashboard for everyone
Moto 'G2' specs revealed in benchmarks
OnePlus One India launch confirmed
Xiaomi lists Mi3 cases and power-banks on Flipkart, offers 10,400 mAh powerbank for Rs. 999
Moto G2 expected to be announced on 10 September
Xiaomi goes for the kill, prices Redmi 1S at Rs. 5,999 in India
Wicked Leak Wammy Note 3
Digiflip Pro XT901
Digiflip Pro XT911
Digiflip Pro XT801
Digiflip Pro XT811
How to use Intel Cilk Plus to speed up your Android application
How to get started with OpenCL on Android OS
How to implement Gesture Sequences in Unity 3D game engine via TouchScript framework
How to use Intel Perceptual Computing to develop engaging apps
How to choose the right engine for your x86-based Android game
How to Develop an Intelligent Autonomous Drone using an Android Smartphone
How to use Intel WiDi technology to project your App onto a bigger screen
How to Optimize Your Android Apps (NDK) in Two Minutes on Intel Architecture
How to Set Up an NDK Project to Compile for Multiple Target Platforms
Xiaomi Redmi 1S - First Impressions
HTC One E8 - First Impressions
Asus Zenfone 6 Review - User Interface
Asus Zenfone 6 Review - Build & Design
Garmin Vivofit - Hands On Demo
First look: Videocon 4K UHD LED TV with smart features
Hands On: Xiaomi Redmi 1S
7 best smartphones under Rs. 7,000 in India
The 5 best Windows 8 laptops under Rs. 30,000
The 20 most awaited games of 2014
Register for the Digit.in Reward Program
How to earn points?
Google reveals some interesting facts about its measures taken to secure users' accounts and privacy.
Google has announced its “war against account hijackers” campaign has helped reducing account hacking by 99.7 percent since the launch of the initiative.
Google in a blog post said, scams, illegal, fraudulent or spam messages often come a person's own contacts. Though only 1 percent of that spam shows up in the inbox, spammers have of late started targeting hijacking accounts. Moreover, spammers have now become “account thieves” sneaking into databases to steal usernames, passwords and online elements of the accounts.
“With stolen passwords in hand, attackers attempt to break into accounts across the web and across many different services. We’ve seen a single attacker using stolen passwords to attempt to break into a million different Google accounts every single day, for weeks at a time,” says Google in the blog.
“A different gang attempted sign-ins at a rate of more than 100 accounts per second. Other services are often more vulnerable to this type of attack, but when someone tries to log into your Google Account, our security system does more than just check that a password is correct.”
Google also explains how its Security tools help users protect their account. Every time a user signs into Google via web or another platform that checks for new mail every five minutes, Google's system conducts a complex risk analysis to determine how likely is that sign-in has come from the valid users. Google uses more than 120 variables to make a decision.
“If a sign-in is deemed suspicious or risky for some reason—maybe it’s coming from a country oceans away from your last sign-in—we ask some simple questions about your account. For example, we may ask for the phone number associated with your account, or for the answer to your security question,” adds Google.
“These questions are normally hard for a hijacker to solve, but are easy for the real owner. Using security measures like these, we've dramatically reduced the number of compromised accounts by 99.7 percent since the peak of these hijacking attempts in 2011.”