A security bug has been discovered in Google Chrome browser that allows the software to automatically display users’ saved passwords while importing bookmarks from other browser. According to ABC News, the web designer, Elliott Kember discovered the flaw while importing his bookmarks from Safari browser to Chrome and found that while there is a check mark to … Continue reading Chrome bug reveals your passwords
The World of Technology and Elegance: All You Need to Know About Smartphones The smartphone industry is increasingly growing each and everyday. Various manufacturers and designers are coming up with new ideas and innovations. For people who are planning to own this gadget and they probably do not know what to expect from these new … Continue reading The World of Technology and Elegance: All You Need to Know About Smartphones
Hello Everyone! How you doing? Hope you all are fine and doing good. Every blogger was in contact with the Google’s blogspot network. And it might be the case that you have started blogging with Blogspot.
Make Flow Charts Online Hello Friends. Flowcharts are the important things in any work. Whether it is a Management Task or Technical Task or just for a planning, people make use of Flow Charts. Flow Charts make the planning and discussion process very easy and productive. Here are some online tools to make Flow Charts … Continue reading Make Flow Charts Online
‘Mass Exploit Distribution’ 0-day vulnerability of Java revealed On 10th of January a 0-day vulnerability of Java revealed. Oracle has not quoted any response on this vulnerability till now, despite widespread adoption by exploit kits and evidence it is being used to serve up nasty malware.
Top E-commerce Features of Magento There is a myth in web sphere that Magento is an over expected open source web content management system. It cannot meet with new age e-commerce challenges. It is very complex for first time e-commerce business organizations.
Security Flaw found in Samsung Galaxy Phones Samsung has been in the talks for its flagship devices Samsung Galaxy S III and Note II. But now here is some trouble for the users of these devices. Yes the security of these devices is found vulnerable and can lead to malware attacks.
Protect Social Profiles from Hackers Hackers; word itself defines a different class of computer users who are famous for some of their good and some of their bad acts and myths. So today I’m gonna share some ways to stay protected from bad Hackers called Black Hats or Crackers in a digitally open and social … Continue reading 10 ways to protect Social Profiles from Hackers