Huawei Honor Holly
Huawei Honor 6
Oplus XonPhone 5
Xiaomi Redmi 1S
Asus Zenfone 6
Asus Zenfone 5
HTC One (M8)
Analysis: Sony Xperia Z3 camera capability and image quality
How to shop smarter online to get best prices, discounts
Xiaomi Redmi 1S tested after OTA update
iPhone 6 Plus vs Galaxy Note 4 vs Nexus 6: Specs Comparison
SignEasy lets you sign documents digitally on your phone or tablet
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
Indian Air Force asks personnel not to use Xiaomi phones
Apple issues security warning for iCloud
Intex Aqua Amaze octa-core smartphone launched at Rs. 10,690
Microsoft releases first update to its Windows 10 Technical Preview
Philips Aurora i966 with 5.5-inch QHD display, 3GB RAM unveiled
Moto G 2nd gen launched, available from midnight at Rs. 12,999
Xiaomi goes for the kill, prices Redmi 1S at Rs. 5,999 in India
Xiaomi lists Mi3 cases and power-banks on Flipkart, offers 10,400 mAh powerbank for Rs. 999
Moto G2 expected to be announced on 10 September
Motorola Moto X (Gen 2) smartphone, Moto 360 smartwatch announced for India
Dell Inspiron 3542
Acer Aspire E1-572
ASUS Zenbook UX302LG
Lenovo Yoga Tablet 2 Pro
Lenovo Yoga Tablet 2 10.1 Windows
Overview: Implementing fast real-time GPU-based image blur algorithms
How to use Intel Perceptual Computing SDK for human-robot interface
How to use touch gestures to Influence Physics Parameters using TouchScript
Case Study: How to adapt multiple input methods on Intel based hybrid devices
How to fix Nexus 4 power button issue
How to get started with OpenCL on Android OS
How to use Intel Cilk Plus to speed up your Android application
Tutorial: How to implement H.265/HEVC for Intel Atom Based Android Platforms
How to implement Gesture Sequences in Unity 3D game engine via TouchScript framework
How to use Native Library Compression SDK for Android apps
Digit News Update [21 Oct 2014]
Digit News Update [20 OCT 2014]
Pentax K-500 Camera Review
Lenovo launches Yoga 2 series tablets
Apple unveils ipad air 2 and the ipad mini 3
Best online deals to look out for today
5 apps to get the Android Lollipop look on your smartphone
Top 10 value for money phones to buy from 6K to 20K
Apple iPad Air 2 vs. Google Nexus 9: Specs comparison
Lenovo Yoga 2 tablets: Hands on
Google has warned users that they may lose access to the Internet on July 9 because of a DNSChanger Trojan.
According to reports, U.S.' FBI has detected the virus and set up a safety net to ensure infected computers are safe. The problem began when the international hackers ran online advertising scam to gain control of the affected devices across the globe, it's learnt.
Google, meanwhile, has launched an awareness campaign for its users to keep its users away from the virus. Google will be displaying pop up alerts that will come on top of the search results page.
Google is notifying its users about the threat of DNSChanger, with a message: “your computer appears to be infected” for devices infected by the virus. Google had launched a similar awareness campaign last year for a different sort of malware.
According to Google, so far up to 500,000 internet users might have been hit by the malware.
“The Domain Name System (DNS) translates familiar web address names like google.com into a numerical address that computers use to send traffic to the right place. The DNSChanger malware modifies DNS settings to use malicious servers that point users to fake sites and other harmful locations,” said Google' security engineer, Damian Menscher in blog post.
“DNSChanger attempts to modify the settings on home routers as well, meaning other computers and mobile devices may also be affected”.
Google warns in case your computer shows DNSChanger corruption, you will receive, along with the notification, recommendations from Google as to how to purge the malware from your devices. Though Google does not guarantee full recovery, but it adds, "If more devices are cleaned and steps are taken to better secure the machines against further abuse, the notification effort will be well worth it."
To learn more about the hack attack and how you can detect whether your computer's infected, click here.