WWE 2K15 (Xbox 360)
Logitech Bluetooth Audio Adapter
Lenovo Vibe X2
Microsoft Lumia 730
Martian Notifier smartwatch
How offline retailers can make a comeback
Preview: Digit December 2014 Collector’s Edition
6 important takeaways from Google's study on e-commerce in India
Android Lollipop vs KitKat on Nexus 4
Nokia N1 Android tablet: All you need to know
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
Panasonic Eluga I, 5-inch quad-core phone launched at Rs. 9,490
Symantec uncovers new computer malware, Regin
G2A: an 'unknown' site with killer deals on PC games
Xiaomi Redmi Note 3G, 4G versions launched in India, start at Rs. 8,999
OnePlus One will be Amazon India exclusive, invite only
Obi Alligator S454
Intex Aqua V4
Huawei Ascend P7
Micromax Bolt AD4500
Microsoft Lumia 535 Dual
Case Study: Developing a Health App for Windows 8
Case Study: Developing an augmented reality app for Intel based devices
Use Spotify, Netflix in India on your PC, Android smartphone
Overview: Implementing fast real-time GPU-based image blur algorithms
How to use Intel Perceptual Computing SDK for human-robot interface
How to upgrade your laptop or ultrabook's hard drive to an mSATA or M.2 SSD
Jolla Smartphone Review
iPhone 5S vs iPhone 6 Showdown
Samsung Galaxy Note 4 - The best phablet today
Digit's 11 hi-tech tests that gadgets fear
5 essential system utilities for Android
4 Android features erased by Lollipop update
5 great Android games launched this month
The 5 most underrated and under-hyped smartphones of 2014
5 great Android apps launched this month
Intel Developer Zone
Intel Windows Developer Zone
Dsk International Campus Zone
Acer Aspire E5Intel Core i7 Processor, Windows 8.1 , 12 GB RAM, 1TB Hard Disk Space, 2GB GraphicsClick to know more
Peer to Peer Connection in AndroidHow to setup the peer to peer connection between two Android devices
Click to know more
Google has announced its “war against account hijackers” campaign has helped reducing account hacking by 99.7 percent since the launch of the initiative.
Google in a blog post said, scams, illegal, fraudulent or spam messages often come a person's own contacts. Though only 1 percent of that spam shows up in the inbox, spammers have of late started targeting hijacking accounts. Moreover, spammers have now become “account thieves” sneaking into databases to steal usernames, passwords and online elements of the accounts.
“With stolen passwords in hand, attackers attempt to break into accounts across the web and across many different services. We’ve seen a single attacker using stolen passwords to attempt to break into a million different Google accounts every single day, for weeks at a time,” says Google in the blog.
“A different gang attempted sign-ins at a rate of more than 100 accounts per second. Other services are often more vulnerable to this type of attack, but when someone tries to log into your Google Account, our security system does more than just check that a password is correct.”
Google also explains how its Security tools help users protect their account. Every time a user signs into Google via web or another platform that checks for new mail every five minutes, Google's system conducts a complex risk analysis to determine how likely is that sign-in has come from the valid users. Google uses more than 120 variables to make a decision.
“If a sign-in is deemed suspicious or risky for some reason—maybe it’s coming from a country oceans away from your last sign-in—we ask some simple questions about your account. For example, we may ask for the phone number associated with your account, or for the answer to your security question,” adds Google.
“These questions are normally hard for a hijacker to solve, but are easy for the real owner. Using security measures like these, we've dramatically reduced the number of compromised accounts by 99.7 percent since the peak of these hijacking attempts in 2011.”