HTC Desire 616 Dual SIM
Lava Iris X1
HTC Desire 516
Asus Zenfone 5
HTC One (M8)
Micromax Unite 2 A106
Why the Nokia Lumia 530 will probably disappoint
Will the Xiaomi Mi Band be a game changer for wearable devices?
In Focus: Walk Me Up! Alarm app for Android
Xiaomi MIUI reviewed
LG G3 First Impression: Great screen, smart design & power packed.
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
CERT-In warns about debit/credit card information stealing BrutPOS virus
Swatch Touch to integrate fitness tracking capabilities by 2015
Google and Motorola are probably building the next Nexus phone
Xiaomi Mi3 goes on sale in India again in about an hour
London Mayor says it will be first city to get 5G
HTC Desire 516 launched in India for Rs. 14,200
Xiaomi goes for the kill, prices Mi 3, Redmi Note & Redmi 1S aggressively
ISPs block Torrent, hosting websites after court order: Reports
Asus launches ZenFone series of Android phones in India, prices them competitively
CyanogenMod finds 'Heads up' notification mode in Android
Dell Vostro 14 3442 4th gen CDC/4 GB/500 GB/Win 8.1
Dell Inspiron 15 5547 4th gen Ci7/8 GB/1 TB/Win 8.1/ 2GB Graph
Dell Inspiron 15 5547 4th gen Ci5/4 GB/500 GB/Win 8.1/ 2GB Graph
Dell Inspiron 14 3442 4th gen Ci3/4 GB/500 GB/Win 8.1
Dell Inspiron 14 3442 4th gen Ci5/4 GB/1 TB/Win 8.1
How to Develop an Intelligent Autonomous Drone using an Android Smartphone
How to use Intel VTune Amplifier 2014 for Systems on a Dell Venue 8
How to Set Up an NDK Project to Compile for Multiple Target Platforms
Guide: How To Implement native Intel x86 Support for Android Apps to boost performance
How to setup a surveillance system for your business
How to become a cyber-forensics expert
How to create your own TOR url
How to create your own lyrics video
How to become a social media star
How to build your own app
Samsung Galaxy Tab S 8.4 - Video Playback
Samsung Galaxy Tab S 8.4 - First Impressions
Xiaomi Mi3 Review
HTC Desire 616 - First Impressions
Xiaomi mi3 Review Performance
7 best cases for your Xiaomi Mi3
8 upcoming smartphones that you should be looking out for
The A list: The Best Smartphone to buy for every budget
13 things that you should know about the Xiaomi Mi3
Hands-on: Samsung Galaxy Tab S 8.4, the iPad Mini challenger
Register for the Digit.in Reward Program
How to earn points?
Google reveals some interesting facts about its measures taken to secure users' accounts and privacy.
Google has announced its “war against account hijackers” campaign has helped reducing account hacking by 99.7 percent since the launch of the initiative.
Google in a blog post said, scams, illegal, fraudulent or spam messages often come a person's own contacts. Though only 1 percent of that spam shows up in the inbox, spammers have of late started targeting hijacking accounts. Moreover, spammers have now become “account thieves” sneaking into databases to steal usernames, passwords and online elements of the accounts.
“With stolen passwords in hand, attackers attempt to break into accounts across the web and across many different services. We’ve seen a single attacker using stolen passwords to attempt to break into a million different Google accounts every single day, for weeks at a time,” says Google in the blog.
“A different gang attempted sign-ins at a rate of more than 100 accounts per second. Other services are often more vulnerable to this type of attack, but when someone tries to log into your Google Account, our security system does more than just check that a password is correct.”
Google also explains how its Security tools help users protect their account. Every time a user signs into Google via web or another platform that checks for new mail every five minutes, Google's system conducts a complex risk analysis to determine how likely is that sign-in has come from the valid users. Google uses more than 120 variables to make a decision.
“If a sign-in is deemed suspicious or risky for some reason—maybe it’s coming from a country oceans away from your last sign-in—we ask some simple questions about your account. For example, we may ask for the phone number associated with your account, or for the answer to your security question,” adds Google.
“These questions are normally hard for a hijacker to solve, but are easy for the real owner. Using security measures like these, we've dramatically reduced the number of compromised accounts by 99.7 percent since the peak of these hijacking attempts in 2011.”