HTC Desire 616 Dual SIM
Lava Iris X1
HTC Desire 516
Asus Zenfone 5
HTC One (M8)
Micromax Unite 2 A106
Demystifying the cool new Yahoo with Hari Vasudev
Smartphones that let you control your TV
The 8 best water resistant smartphones to buy
Why the Nokia Lumia 530 will probably disappoint
Will the Xiaomi Mi Band be a game changer for wearable devices?
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
Microsoft and Intel brings Windows to Raspberry Pi style board
Unu Ultrapak can power your smartphone in just 15 mins
CERT-In warns about debit/credit card information stealing BrutPOS virus
Swatch Touch to integrate fitness tracking capabilities by 2015
Google and Motorola are probably building the next Nexus phone
HTC Desire 516 launched in India for Rs. 14,200
Xiaomi goes for the kill, prices Mi 3, Redmi Note & Redmi 1S aggressively
ISPs block Torrent, hosting websites after court order: Reports
Asus launches ZenFone series of Android phones in India, prices them competitively
CyanogenMod finds 'Heads up' notification mode in Android
Dell Vostro 14 3442 4th gen CDC/4 GB/500 GB/Win 8.1
Dell Inspiron 15 5547 4th gen Ci7/8 GB/1 TB/Win 8.1/ 2GB Graph
Dell Inspiron 15 5547 4th gen Ci5/4 GB/500 GB/Win 8.1/ 2GB Graph
Dell Inspiron 14 3442 4th gen Ci3/4 GB/500 GB/Win 8.1
Dell Inspiron 14 3442 4th gen Ci5/4 GB/1 TB/Win 8.1
How to use Intel WiDi technology to project your App onto a bigger screen
How to Optimize Your Android Apps (NDK) in Two Minutes on Intel Architecture
How to Develop an Intelligent Autonomous Drone using an Android Smartphone
How to use Intel VTune Amplifier 2014 for Systems on a Dell Venue 8
How to Set Up an NDK Project to Compile for Multiple Target Platforms
How to become a cyber-forensics expert
How to create your own TOR url
How to create your own lyrics video
How to become a social media star
How to build your own app
Samsung Galaxy Tab S 8.4 - Video Playback
Samsung Galaxy Tab S 8.4 - First Impressions
Xiaomi Mi3 Review
HTC Desire 616 - First Impressions
Xiaomi mi3 Review Performance
Digit August 2014
7 best cases for your Xiaomi Mi3
8 upcoming smartphones that you should be looking out for
The A list: The Best Smartphone to buy for every budget
13 things that you should know about the Xiaomi Mi3
Register for the Digit.in Reward Program
How to earn points?
Google has warned users that they may lose access to the Internet on July 9 because of a DNSChanger Trojan.
According to reports, U.S.' FBI has detected the virus and set up a safety net to ensure infected computers are safe. The problem began when the international hackers ran online advertising scam to gain control of the affected devices across the globe, it's learnt.
Google, meanwhile, has launched an awareness campaign for its users to keep its users away from the virus. Google will be displaying pop up alerts that will come on top of the search results page.
Google is notifying its users about the threat of DNSChanger, with a message: “your computer appears to be infected” for devices infected by the virus. Google had launched a similar awareness campaign last year for a different sort of malware.
According to Google, so far up to 500,000 internet users might have been hit by the malware.
“The Domain Name System (DNS) translates familiar web address names like google.com into a numerical address that computers use to send traffic to the right place. The DNSChanger malware modifies DNS settings to use malicious servers that point users to fake sites and other harmful locations,” said Google' security engineer, Damian Menscher in blog post.
“DNSChanger attempts to modify the settings on home routers as well, meaning other computers and mobile devices may also be affected”.
Google warns in case your computer shows DNSChanger corruption, you will receive, along with the notification, recommendations from Google as to how to purge the malware from your devices. Though Google does not guarantee full recovery, but it adds, "If more devices are cleaned and steps are taken to better secure the machines against further abuse, the notification effort will be well worth it."
To learn more about the hack attack and how you can detect whether your computer's infected, click here.