Logitech Bluetooth Audio Adapter
Lenovo Vibe X2
Microsoft Lumia 730
Martian Notifier smartwatch
Motorola Moto 360
How offline retailers can make a comeback
6 important takeaways from Google's study on e-commerce in India
Android Lollipop vs KitKat on Nexus 4
Nokia N1 Android tablet: All you need to know
Moving ahead with Microsoft Azure
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
NotCompatible: New malware threat for Android devices
Xiaomi readies the Redmi Note for Dec 2 launch, announces a contest
100 OnePlus One India invites up for grabs via contest
Xiaomi to launch smartwatches next year?
Twitter now lets you send private tweets
Alcatel One Touch Flash
Celkon Millennia Epic Q550
Karbonn Titanium S12 Delite
Case Study: Developing a Health App for Windows 8
Case Study: Developing an augmented reality app for Intel based devices
Use Spotify, Netflix in India on your PC, Android smartphone
Overview: Implementing fast real-time GPU-based image blur algorithms
How to use Intel Perceptual Computing SDK for human-robot interface
How to upgrade your laptop or ultrabook's hard drive to an mSATA or M.2 SSD
Jolla Smartphone Review
iPhone 5S vs iPhone 6 Showdown
Samsung Galaxy Note 4 - The best phablet today
Digit's 11 hi-tech tests that gadgets fear
4 Android features erased by Lollipop update
5 great Android games launched this month
The 5 most underrated and under-hyped smartphones of 2014
5 great Android apps launched this month
The 5 most overrated and overhyped smartphones of 2014
Intel Developer Zone
Intel Windows Developer Zone
Dsk International Campus Zone
Acer Aspire E5Intel Core i7 Processor, Windows 8.1 , 12 GB RAM, 1TB Hard Disk Space, 2GB GraphicsClick to know more
Peer to Peer Connection in AndroidHow to setup the peer to peer connection between two Android devices
Click to know more
Even as smartphones have emerged as the new targets for cybercriminals, PCs are still the 'prevalent' target for malware authors, suggests a new report prepared by Quick Heal Technologies.
The report titled 'Quick Heal Annual Windows and Mobile Malware Report, 2012' suggests cybercriminals have continued to run on the loose in the country with Windows malware reporting a surge of about 90 percent, and a whopping surge of 170 percent in modifications.
The mobile devices have also continued to be targeted. According to the report, virus attacks in the mobile space have surged 30 percent in 2012 and 80 percent surge in its modifications. The Internet is still the most conventional way of spreading malware.
The report further notes a consistent surge in the number of malware attacks on the Google's Android platform whereas the mobile apps have become the easiest targets.
Commenting on the findings of the research, Sanjay Katkar, technical director and CTO, Quick Heal Technologies, said: "Windows is still the most attacked Operating System. 2012 saw numerous attacks that were devised for Windows vulnerabilities. Cybercriminals have leveraged zero-day exploits even more effectively with new software patterns and business models".
A recent report had suggested the growing usages of mobile communication devices and an 'overlap of work and personal data' posed an increased threat of data theft and other malware attacks in the coming year.
According to the report, the governments will have to enter the cyber warfare arena, while there could be surge in timed and targeted spear-phishing e-mail attacks, and malicious e-mail attachments.
Also, a study conducted by Imperva revealed major antivirus software are far less effective than expected. Read our coverage on the Imperva study here.
Source: Times of India