HTC Desire 616 Dual SIM
Lava Iris X1
HTC Desire 516
Asus Zenfone 5
HTC One (M8)
Micromax Unite 2 A106
Demystifying the cool new Yahoo with Hari Vasudev
Smartphones that let you control your TV
The 8 best water resistant smartphones to buy
Why the Nokia Lumia 530 will probably disappoint
Will the Xiaomi Mi Band be a game changer for wearable devices?
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
Microsoft and Intel brings Windows to Raspberry Pi style board
Unu Ultrapak can power your smartphone in just 15 mins
CERT-In warns about debit/credit card information stealing BrutPOS virus
Swatch Touch to integrate fitness tracking capabilities by 2015
Google and Motorola are probably building the next Nexus phone
HTC Desire 516 launched in India for Rs. 14,200
Xiaomi goes for the kill, prices Mi 3, Redmi Note & Redmi 1S aggressively
ISPs block Torrent, hosting websites after court order: Reports
Asus launches ZenFone series of Android phones in India, prices them competitively
CyanogenMod finds 'Heads up' notification mode in Android
Dell Vostro 14 3442 4th gen CDC/4 GB/500 GB/Win 8.1
Dell Inspiron 15 5547 4th gen Ci7/8 GB/1 TB/Win 8.1/ 2GB Graph
Dell Inspiron 15 5547 4th gen Ci5/4 GB/500 GB/Win 8.1/ 2GB Graph
Dell Inspiron 14 3442 4th gen Ci3/4 GB/500 GB/Win 8.1
Dell Inspiron 14 3442 4th gen Ci5/4 GB/1 TB/Win 8.1
How to use Intel WiDi technology to project your App onto a bigger screen
How to Optimize Your Android Apps (NDK) in Two Minutes on Intel Architecture
How to Develop an Intelligent Autonomous Drone using an Android Smartphone
How to use Intel VTune Amplifier 2014 for Systems on a Dell Venue 8
How to Set Up an NDK Project to Compile for Multiple Target Platforms
How to become a cyber-forensics expert
How to create your own TOR url
How to create your own lyrics video
How to become a social media star
How to build your own app
Samsung Galaxy Tab S 8.4 - Video Playback
Samsung Galaxy Tab S 8.4 - First Impressions
Xiaomi Mi3 Review
HTC Desire 616 - First Impressions
Xiaomi mi3 Review Performance
Digit August 2014
7 best cases for your Xiaomi Mi3
8 upcoming smartphones that you should be looking out for
The A list: The Best Smartphone to buy for every budget
13 things that you should know about the Xiaomi Mi3
Register for the Digit.in Reward Program
How to earn points?
The Quick Heal Annual Windows and Mobile Malware Report, 2012, released by Quick Heal Technologies says PCs are still the the prevalent target for malware authors while there has been growth in malware, especially targeting the mobile platform.
Even as smartphones have emerged as the new targets for cybercriminals, PCs are still the 'prevalent' target for malware authors, suggests a new report prepared by Quick Heal Technologies.
The report titled 'Quick Heal Annual Windows and Mobile Malware Report, 2012' suggests cybercriminals have continued to run on the loose in the country with Windows malware reporting a surge of about 90 percent, and a whopping surge of 170 percent in modifications.
The mobile devices have also continued to be targeted. According to the report, virus attacks in the mobile space have surged 30 percent in 2012 and 80 percent surge in its modifications. The Internet is still the most conventional way of spreading malware.
The report further notes a consistent surge in the number of malware attacks on the Google's Android platform whereas the mobile apps have become the easiest targets.
Commenting on the findings of the research, Sanjay Katkar, technical director and CTO, Quick Heal Technologies, said: "Windows is still the most attacked Operating System. 2012 saw numerous attacks that were devised for Windows vulnerabilities. Cybercriminals have leveraged zero-day exploits even more effectively with new software patterns and business models".
A recent report had suggested the growing usages of mobile communication devices and an 'overlap of work and personal data' posed an increased threat of data theft and other malware attacks in the coming year.
According to the report, the governments will have to enter the cyber warfare arena, while there could be surge in timed and targeted spear-phishing e-mail attacks, and malicious e-mail attachments.
Also, a study conducted by Imperva revealed major antivirus software are far less effective than expected. Read our coverage on the Imperva study here.
Source: Times of India