HTC Desire 616 Dual SIM
Lava Iris X1
HTC Desire 516
Asus Zenfone 5
HTC One (M8)
Micromax Unite 2 A106
With $1 billion in bag, how Flipkart can ramp up to next level?
Experiencing the Intel Android Codefest in New York
Demystifying the cool new Yahoo with Hari Vasudev
Smartphones that let you control your TV
The 8 best water resistant smartphones to buy
How tech is taking football to the next level
Classic FPS games are a dying breed
Slowly gathering steam...
The obsession within
Carmick Shift: Can John Carmack and Oculus Rift change the world?
Broadcom video codec to power Tata Sky's Ultra HD set-top boxes
Samsung's latest smartwatch patent reveals a round display
Now subscribe to EA's games on Xbox One for Rs. 300 a month
Apple's Retina Macbook Pros now with faster CPU, more RAM
Micromax Canvas L A108, 5.5-inch quad-core phone listed online
HTC Desire 516 launched in India for Rs. 14,200
Xiaomi goes for the kill, prices Mi 3, Redmi Note & Redmi 1S aggressively
ISPs block Torrent, hosting websites after court order: Reports
Asus launches ZenFone series of Android phones in India, prices them competitively
CyanogenMod finds 'Heads up' notification mode in Android
Panasonic Eluga U
Samsung Galaxy Ace NXT
Samsung Galaxy Star 2 Plus
Micromax Canvas L A108
Dell Vostro 14 3442 4th gen CDC/4 GB/500 GB/Win 8.1
How to Implement map and geofence features in Android business apps
How to use Intel WiDi technology to project your App onto a bigger screen
How to Optimize Your Android Apps (NDK) in Two Minutes on Intel Architecture
How to Develop an Intelligent Autonomous Drone using an Android Smartphone
How to use Intel VTune Amplifier 2014 for Systems on a Dell Venue 8
How to become a cyber-forensics expert
How to create your own TOR url
How to create your own lyrics video
How to become a social media star
How to listen to free music online through scrobbling
Samsung Galaxy Tab S 8.4 - Video Playback
Samsung Galaxy Tab S 8.4 - First Impressions
Xiaomi Mi3 Review
HTC Desire 616 - First Impressions
Xiaomi mi3 Review Performance
Digit August 2014
7 best cases for your Xiaomi Mi3
8 upcoming smartphones that you should be looking out for
The A list: The Best Smartphone to buy for every budget
13 things that you should know about the Xiaomi Mi3
Register for the Digit.in Reward Program
How to earn points?
The growing usages of mobile communication devices and an 'overlap of work and personal data' poses an increased threat of data theft and other malware attacks in the coming year, warn the cyber security software companies.
According to these firms, the governments will look to enter the cyber warfare arena, while there could be surge in timed and targeted spear-phishing e-mail attacks, and malicious e-mail attachments.
Websense Security Labs forecasts the mobile devices will emerge the top target for cross-platform threats with a particular focus on Windows 8, Android and iOS. The company predicts a significant growth in Microsoft mobile devices.
The McAfee Threats Report for Q3 2012 says there's two-fold growth in mobile malware as compared to the previous quarter's total. There's also a surge in some categories of malware such as ransomware and signed binaries.
"As development barriers are removed, mobile threats will be able to leverage a huge library of shared code. Social engineering lures to capture user credentials on mobile devices will be used. Cybercriminals will use bypass methods to avoid traditional sandbox detection. More organizations are utilizing virtual machine defenses to test for malware and threats. As a result, attackers are taking new steps to avoid detection by recognizing virtual machine environments," the report said.
On the possibilities of the governments entering cyber warfare arena, the report said, "In the wake of several publicized cyber-warfare events, there are a number of contributing factors that will drive more countries toward these strategies and tactics," the report said, adding that countries and individual cybercriminals all have access to the blueprints for previous state-sponsored attacks like Stuxnet, Flame and Shamoon.
"The past year illustrated how quickly the threat landscape continues to evolve, with attacks and exploits redefining the concepts of crime, business espionage and warfare. The risk to organizations continues to be amplified by the frailty of human curiosity. It's now expanding across diverse mobile platforms, evolving content management systems and an ever-increasing population of online users," says Charles Renert, vice president of Websense Security Labs.
"2013 will absolutely reinforce the fact that traditional security measures are no longer effective in thwarting advanced cyber attacks. Organizations and security providers need to evolve toward more pro-active real-time defenses that stop advanced threats and data theft," he concluded.