Sony Xperia Z3 Review
Sony Xperia Z3 Compact
Karbonn Sparkle V (Android One)
Micromax Canvas A1 (Android One)
Xiaomi Redmi 1S
Asus Zenfone 6
Asus Zenfone 5
HTC One (M8)
First Impressions: Blackberry Passport
Samsung Galaxy Alpha: First impressions of Samsung's premium mini phone
A date with the Oculus Rift
Windows 9: The bloodiest war for your PC is coming soon
Hot Shots: A Windows game that warps conventional touch based gaming
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
Xolo launches the Q2100 with integrated fingerprint sensor
Samsung India launches Galaxy Grand Prime to compete with the Moto G
YotaPhone dual-screen smartphone spotted on Flipkart
Lumia 930, 830 and 730 WP 8.1-based phones launched in India
Broadband adoption rate improves in India: Akamai report
Moto G 2nd gen launched, available from midnight at Rs. 12,999
Xiaomi goes for the kill, prices Redmi 1S at Rs. 5,999 in India
Xiaomi lists Mi3 cases and power-banks on Flipkart, offers 10,400 mAh powerbank for Rs. 999
Moto G2 expected to be announced on 10 September
Motorola Moto X (Gen 2) smartphone, Moto 360 smartwatch announced for India
Intex Aqua Star Power
Intex Aqua Star HD
Intex Aqua Star
Idea Magna L
Case Study: Optimizing Cyberlink PowerDVD to improve battery life on Intel devices
How to use Parallel Programming with C#
Create a music App with touch, stylus & keyboard control for Windows 8 tablets
How to optimize multimedia & augmented reality Android apps for Intel platform
How to use Intel INDE Media Pack for Android to add video capturing capability for Unity Apps
How to Develop an Intelligent Autonomous Drone using an Android Smartphone
How to get started with OpenCL on Android OS
How to use Intel Cilk Plus to speed up your Android application
How to choose the right engine for your x86-based Android game
How to create sample codes for Video 3D on Android
Nokia Lumia 930 - First Impressions
Nokia Lumia 830 - First Impressions
Nokia Lumia 730 - First Impressions
Microsoft jumps to Windows 10 and rolls back to Windows 7 features
First look: Lenovo Vibe Z2 Pro
Hands On: Nokia Lumia 930
Top 5 Flagship Android smartphones to buy today
Hands On: Nokia Lumia 730
The 5 best high-end smartphones to buy today
Google reveals some interesting facts about its measures taken to secure users' accounts and privacy.
Google has announced its “war against account hijackers” campaign has helped reducing account hacking by 99.7 percent since the launch of the initiative.
Google in a blog post said, scams, illegal, fraudulent or spam messages often come a person's own contacts. Though only 1 percent of that spam shows up in the inbox, spammers have of late started targeting hijacking accounts. Moreover, spammers have now become “account thieves” sneaking into databases to steal usernames, passwords and online elements of the accounts.
“With stolen passwords in hand, attackers attempt to break into accounts across the web and across many different services. We’ve seen a single attacker using stolen passwords to attempt to break into a million different Google accounts every single day, for weeks at a time,” says Google in the blog.
“A different gang attempted sign-ins at a rate of more than 100 accounts per second. Other services are often more vulnerable to this type of attack, but when someone tries to log into your Google Account, our security system does more than just check that a password is correct.”
Google also explains how its Security tools help users protect their account. Every time a user signs into Google via web or another platform that checks for new mail every five minutes, Google's system conducts a complex risk analysis to determine how likely is that sign-in has come from the valid users. Google uses more than 120 variables to make a decision.
“If a sign-in is deemed suspicious or risky for some reason—maybe it’s coming from a country oceans away from your last sign-in—we ask some simple questions about your account. For example, we may ask for the phone number associated with your account, or for the answer to your security question,” adds Google.
“These questions are normally hard for a hijacker to solve, but are easy for the real owner. Using security measures like these, we've dramatically reduced the number of compromised accounts by 99.7 percent since the peak of these hijacking attempts in 2011.”