Huawei Honor 6
Oplus XonPhone 5
Samsung Galaxy Alpha
iBall Slide WQ32 tablet
Xiaomi Redmi 1S
Asus Zenfone 6
Asus Zenfone 5
HTC One (M8)
How to shop smarter online to get best prices, discounts
Xiaomi Redmi 1S tested after OTA update
iPhone 6 Plus vs Galaxy Note 4 vs Nexus 6: Specs Comparison
SignEasy lets you sign documents digitally on your phone or tablet
All you need to know about the Asus Nexus Player
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
iCloud may have been hacked by Chinese government
Android Lollipop update: Confirmed device list so far
Gmail v5.0 for Android to bring Yahoo and Outlook account support
Samsung eyes India's 4G mobile market
Sony Xperia Z4 specs leaked, expected to launch in March
Moto G 2nd gen launched, available from midnight at Rs. 12,999
Xiaomi goes for the kill, prices Redmi 1S at Rs. 5,999 in India
Xiaomi lists Mi3 cases and power-banks on Flipkart, offers 10,400 mAh powerbank for Rs. 999
Moto G2 expected to be announced on 10 September
Motorola Moto X (Gen 2) smartphone, Moto 360 smartwatch announced for India
HTC One M8 Eye
Apple iPad Air 2 WiFi and 3G 128GB
Apple iPad Air 2 WiFi and 3G/4G 64GB
Apple iPad Air 2 WiFi and 3G/4G 16GB
Apple iPad Air 2 WiFi 128GB
How to use Intel Perceptual Computing SDK for human-robot interface
How to use touch gestures to Influence Physics Parameters using TouchScript
Case Study: How to adapt multiple input methods on Intel based hybrid devices
How to fix Nexus 4 power button issue
How to customize Android security using SEAndroid
How to get started with OpenCL on Android OS
How to use Intel Cilk Plus to speed up your Android application
Tutorial: How to implement H.265/HEVC for Intel Atom Based Android Platforms
How to implement Gesture Sequences in Unity 3D game engine via TouchScript framework
How to use Native Library Compression SDK for Android apps
Digit News Update [20 OCT 2014]
Pentax K-500 Camera Review
Lenovo launches Yoga 2 series tablets
Apple unveils ipad air 2 and the ipad mini 3
Intel's New Product Line
5 apps to get the Android Lollipop look on your smartphone
Top 10 value for money phones to buy from 6K to 20K
Apple iPad Air 2 vs. Google Nexus 9: Specs comparison
Lenovo Yoga 2 tablets: Hands on
Nexus 9: A look at Google's new tablet
The growing usages of mobile communication devices and an 'overlap of work and personal data' poses an increased threat of data theft and other malware attacks in the coming year, warn the cyber security software companies.
According to these firms, the governments will look to enter the cyber warfare arena, while there could be surge in timed and targeted spear-phishing e-mail attacks, and malicious e-mail attachments.
Websense Security Labs forecasts the mobile devices will emerge the top target for cross-platform threats with a particular focus on Windows 8, Android and iOS. The company predicts a significant growth in Microsoft mobile devices.
The McAfee Threats Report for Q3 2012 says there's two-fold growth in mobile malware as compared to the previous quarter's total. There's also a surge in some categories of malware such as ransomware and signed binaries.
"As development barriers are removed, mobile threats will be able to leverage a huge library of shared code. Social engineering lures to capture user credentials on mobile devices will be used. Cybercriminals will use bypass methods to avoid traditional sandbox detection. More organizations are utilizing virtual machine defenses to test for malware and threats. As a result, attackers are taking new steps to avoid detection by recognizing virtual machine environments," the report said.
On the possibilities of the governments entering cyber warfare arena, the report said, "In the wake of several publicized cyber-warfare events, there are a number of contributing factors that will drive more countries toward these strategies and tactics," the report said, adding that countries and individual cybercriminals all have access to the blueprints for previous state-sponsored attacks like Stuxnet, Flame and Shamoon.
"The past year illustrated how quickly the threat landscape continues to evolve, with attacks and exploits redefining the concepts of crime, business espionage and warfare. The risk to organizations continues to be amplified by the frailty of human curiosity. It's now expanding across diverse mobile platforms, evolving content management systems and an ever-increasing population of online users," says Charles Renert, vice president of Websense Security Labs.
"2013 will absolutely reinforce the fact that traditional security measures are no longer effective in thwarting advanced cyber attacks. Organizations and security providers need to evolve toward more pro-active real-time defenses that stop advanced threats and data theft," he concluded.