Researchers conducted the first ever large-scale and systematic study of exactly how the trusty apps on Android phones are able to talk to one another and trade information
IS hackers have published a "hitlist" of over 70 US military personnel who have been involved in drone strikes against terror targets in Syria.
Get your low down on what's happening in the world of Hollywood, right here!
Here's what your favourite celebrities are tweeting.
The relationship of India's star cricketer Virat Kohli and NH 10 actress Anushka Sharma were spotted together in Mumbai and the media has gone abuzz.
In his profile, Snowden says he "used to work for the government. Now I work for the public".
Bug bounty hunters or independent ethical hackers are certified cybersecurity professionals or security researchers who crawl the web, scanning the systems for gaps through which hackers can sneak in and alert the companies, says Shivani Shinde.
Unless public health is prioritised over swift re-opening, the chances are that a third wave will hit India sooner than we would like.
Journalists all over the world have been disappearing and some have never been heard again, says Narain D Batra.
IS has published a 'kill list' containing the names, photos and addresses of 100 US military members online and called upon its 'brothers residing in America' to kill them.
Calculative risks is what differentiates the successful businesses from the rest, points out Bhargav Varma, co-founder and COO of CiS App, a social networking venture.
The buzz for JJ Abrams' January 2008 release, Cloverfield, is born out of a clever viral marketing campaign.
Assuring its users that their credit card information on Zomato is fully secure, the company said 'payment related information on Zomato is stored separately.
Around 41 per cent of these companies saw such instances, compared to the global average of 29 per cent. India's number is higher than other countries such as the United States (26 per cent), the United Kingdom (32 per cent) and Japan (27 per cent). It is also worse than other emerging markets. China had 39 per cent of firms affected by data theft. It was 19 per cent and 16 per cent for Brazil and Russia, respectively.
Documents such as PAN card, Aadhaar card, I-T return papers, which are used for KYC, can get leaked from a number of sources. Other prominent sources are the direct sales agents and photocopy shops, say Sanjay Kumar Singh.
The company said this new approach allows developers to train artificial intelligence models without the user data leaving the device, while allowing it to do more with less data.
Norton report says Indians putting themselves at risk over Wi-Fi usage
The hacking group say they will release information on those who help mask the rich.
A look at the top tweets from your favourite Bollywood celebrities:
Physical KYC takes anywhere between two to five working days to get done, V-KYC, only a few minutes.
'Silencing citizens has become a major institutional process under this regime.' 'The anti-Indian argument is a bogey -- meant to silence independent thinking people in India and turn us into goats and sheep.'
'1,300 Muslim youth have been arrested since the riots began and pressure has been constantly mounted on the Delhi police to create a narrative that these youths started the riots.'
Find out who tops McAfee's Most Sensational Celebrities in India.
Today pay-later services are available for practically anything under the sun. And these include small purchases like clothes, gadgets, movie tickets, and even food.
Every year, 1,500-2,000 films are produced in India, losing up to 30 per cent of their business to piracy.
Unique Identification Authority of India said the alleged data breach took place on a website that does not belong to it.
The reforms proposed for the monster examinations, JEE and NEET, which take several students' lives every year don't go far enough.
"The US Intelligence Community (USIC) is confident that the Russian Government directed the recent compromises of e-mails from US persons and institutions, including from US political organisations," said a joint statement issued by the Department of Homeland Security and Director of National Intelligence.
Here are the few candidates who are in contention for the readers' choice for Time magazine's 'Person of the Year' in 2016.
Among other things, taking note of complaints against several Chinese e-commerce players such as Shein, Ali Express etc for sending shipments as 'gifts' to customers in India and avoiding duties, the government has now mandated that all e-commerce sites and apps must have a registered business entity. This will be the importer on record and subject to customs rules, report Subhayan Chakraborty, Neha Alawadhi and Karan Choudhury.
Both protesters and the authorities in Hong Kong are using complex combinations of technology, reports Devangshu Datta.
Senior Congress leader Digvijaya Singh married television anchor Amrita Rai.
'Today it is a studio being held to ransom, tomorrow it will be a government, an entire nation. I don't see anyone laughing when that happens,' says Suparn Verma.
The war between hackers and banks over ATM security will be dynamically redefined, notes Atanu Biswas.
Making water available is always a serious challenge in the summer for all public authorities. This year, the challenge is higher when hand-washing at every opportunity has become a necessity. So keeping potable water lines running without a glitch has become most necessary.
The documents obtained from the cyberattack on Democratic Congressional Campaign Committee was released by a hacker known as Guccifer 2.0.
Nokia has managed to enter the top-five list in the feature phone market within six months of its comeback
Here are six ways your online account can be hacked into, and some simple yet effective ways to protect your Internet avatar.