Here are the countless ways in which Google is spying on you, round the clock. It knows.
Our top 5 tips to strengthen your startup's security system, based on what we learnt from hacking 17 Indian startups worth more than $10 billion.
In the rush to get apps in the market, most developers keep security at the backseat, but that can prove to be costly.
Truecaller is adding on predictive features to make it smarter. This comes just eight days after the launch of a similar caller ID app called Holaa! made in Ind...
Days after the iPhone 6 launch in China, GreatFire.org reports Chinese authorities are staging a MITM attack on Apple’s cloud storage service, iCloud.
Trojan horses, phishing plugins, and theft of user information are some of the risks you’ll face if you land on a website run by the Chinese government.
According to Wikileaks, the company purchased 19 licenses for the malware products in 2012.
China’s next attempt at a mobile homegrown desktop operating system is slated for an October debut. Here's why it might actually work.
Chinese authorities delivered a stiff one-two punch this week to their favorite foreign punching bag, Apple.
As cyber security tensions between the US and China ramp up in the wake of Snowden/NSA, the perceived need for domestic operating systems is higher than ever
China's spat with the US could be an opportunity for it to take steps toward weaning the country off of foreign tech and replace it with homegrown alternatives.
After cybersecurity spat with US, China issues new ‘security review’ system that could block foreign IT companies
All foreign IT products and services sold in China are required to pass a new safety review. Failure to pass results in banishment from China.
Join us in mapping Singapore’s infocomm technology future at Infocomm Technology Roadmap Symposium 2012 : Co-Creating the Future. The Infocomm Development Autho...