Gigabyte GeForce GTX 960 G1 Gaming Graphics Card
Astrum BT-021N Luxury Bass Bluetooth Speaker
Corsair Graphite 760T
HP Pavilion 13
Mitashi GameIn ThunderPro Handheld Gaming Console
World of Tanks: A Quick guide to Tank classes
Windows 10 for phones: 10 things you need to know
WardWiz brings World of Tanks open PC gaming tournament to Pune
Intel INDE 2015 toolkit: 6 ways in which it benefits Android app developers
Bonus: Archiving Data with the Hybrid Cloud
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
Grow Home: Ubisoft announces a new adventure game
This material is so water-repellent that water bounces off it
Sony launches new Digital TV Tuner module for mobile devices
Twitter launches Tweet translation via Bing Translator
India to have more Facebook users on mobile than US By 2017
IFB 23SC3 23 L Convection Microwave Oven
Haier HDA1770EGT 17 L Grill Microwave Oven
Haier HIL2001MBPH 20 L Solo Microwave Oven
Haier HIL2080EGC 20 L Convection Microwave Oven
Haier HIL2801RBSJ 28 L Convection Microwave Oven
How to add x86 support to Android apps using the Unity game engine
How To Excel At Great UX Design
How to be a Resourceful Gamer
How to Install an SSD in your desktop or laptop PC
How to optimize SSD performance in Windows
Upcoming games of 2015 that are worth the wait Part 2
Geforce GTX 960 - First Impressions
7 things you can do with your smartphone
Upcoming games of 2015 that are worth the wait Part 1
Oppo R5 - First Impressions
9 incredible modern science & tech stories from India
An overview and buying advice on Sony Phones available in India
10 neat Google apps you may not know of
Top 10 Android tablets with voice/3G support under Rs. 15,000
Intel Developer Zone
Intel Windows Developer Zone
Dsk International Campus Zone
Google has announced its “war against account hijackers” campaign has helped reducing account hacking by 99.7 percent since the launch of the initiative.
Google in a blog post said, scams, illegal, fraudulent or spam messages often come a person's own contacts. Though only 1 percent of that spam shows up in the inbox, spammers have of late started targeting hijacking accounts. Moreover, spammers have now become “account thieves” sneaking into databases to steal usernames, passwords and online elements of the accounts.
“With stolen passwords in hand, attackers attempt to break into accounts across the web and across many different services. We’ve seen a single attacker using stolen passwords to attempt to break into a million different Google accounts every single day, for weeks at a time,” says Google in the blog.
“A different gang attempted sign-ins at a rate of more than 100 accounts per second. Other services are often more vulnerable to this type of attack, but when someone tries to log into your Google Account, our security system does more than just check that a password is correct.”
Google also explains how its Security tools help users protect their account. Every time a user signs into Google via web or another platform that checks for new mail every five minutes, Google's system conducts a complex risk analysis to determine how likely is that sign-in has come from the valid users. Google uses more than 120 variables to make a decision.
“If a sign-in is deemed suspicious or risky for some reason—maybe it’s coming from a country oceans away from your last sign-in—we ask some simple questions about your account. For example, we may ask for the phone number associated with your account, or for the answer to your security question,” adds Google.
“These questions are normally hard for a hijacker to solve, but are easy for the real owner. Using security measures like these, we've dramatically reduced the number of compromised accounts by 99.7 percent since the peak of these hijacking attempts in 2011.”