Textually Transmitted Diseases on the Rise

Yes — we have officially entered the age of the Textually Transmitted Disease. Last September a virus spread across China, infecting more than 1 million smartphones. This virus dubbed ‘Zombie‘ infiltrated phones and began sending spam messages using the phone’s address book. While this is still shy of being a full-blown TTD, we are well on our way.

Internet security companies expect these viruses to spike as smartphone sales and use increases. Top security firm McAfee has reported that mobile phone malware increased by 46% from 2009 to 2010. Other Internet security companies have noticed the spike as well and attribute much of it to the vulnerabilities in the apps and widgets. ViaForensics noted that even the more famous apps have security flaws including Groupon, Facebook and Mint.com. In fact a large number of the 11 billion+ apps downloaded last year put users information at risk, as do 10 out of the 12 email apps tested.

Continue reading

Golden Seeds plans Angel investment for women entrepreneurs in India

Golden Seeds, a U.S based angel investing group that promotes women entrepreneurs, is exploring opportunities in India. A delegation of 14 will be visiting Delhi, Bangalore and Mumbai, meeting with the early stage investing community and entrepreneurs. As part of this, 10 entrepreneurs are being selected from a call for business plans to pitch for funding from Golden Seeds as well as investors based in India on March 5th, 2011 at a day-long event to be held at the Bombay Stock Exchange.

Continue reading

Breach at NASDAQ; Computers hacked?

Nasdaq

One of the few places which always has security beefed up round the clock, ensuring there is no breach and leakage of important and confidential information, is the stock market. Well, even such places are not free from cyber attacks and hacking. There was one such development last Friday, the 5th of February, wherein the operator of NASDAQ Stock market found some suspicious files on US computer services and also qualms rose of hackers affecting one of the internet-based client applications of Nasdaq.

Continue reading

The global reach of Social Media

Social Media Strategy
Planning your Social Media Strategy (source : Advanced Human Technologies)

For every requirement such as bonding with friends & sharing life’s secrets, articulating strong opinions, analysis & evaluation of a trend, or learning while watching; there’s a plethora of social media options to choose from for each of the thing that forms part of our intent. Year 2011, surely promises to augment this virtual brotherhood, i.e. this optimal representative of a globalizing world.

Continue reading

A Tremulous Terrain – Energy DashBoards

In an era of energy independence and increased global warming, using electricity smartly is as important as using it sparsely.

Transforming the ever increasing monthly electricity bill into richer energy information is a daunting task for smart-grid companies. In the DistribuTech Utility-Industry Conference, held earlier this month, many advanced home energy management systems were launched in the market. Schneider introduced its Wiser product set, inclusive of a wireless thermostat and a display; and Intel announced that Capgemini will use Intel’s Home Energy Dashboard in its utility consulting practice. Energate introduced a Smart Thermostat that connects to a display and other appliances on a home network, thus making it easy to control even from a laptop.

Continue reading

Microsoft: “Oops we did it again” 6 More Critical Security Vulnerabilities

The newest patch from Microsoft appears to b a Mac vs. PC commercial in the making. Don’t be surprised if the next mocking ad from Mac addresses the 900 million people affected by Microsoft’s most recent security patch. The name of the release, Patch “Tuesday” which sounds more like an Irish celebration than a critical software patch, but then again maybe Microsoft was trying to lighten the mood.

The new patch release deals with 22 issues — 6 of them deemed critical (the higher security issue ranking Microsoft has). Another 9 were ranked as ‘Important’ (details).

Continue reading

Can you use Adzly ads on your blog?

Adzly is a new advertising network that many bloggers have taken advantage of. Google Adsense has traditionally been used for bloggers to promote their sites, but new blogs can sometimes be great opportunities to receive traffic that would otherwise have a lot of competition. However, you can’t expect to gain anything from Adzly by cutting and pasting a few quotes from your website. You will need to put some thought into your ad and make sure that it is appealing to your target audience. Hopefully, this is already the core of your marketing strategy.

Continue reading

The Importance of Social Sustainability in Blogosphere

When a thought comes to our mind; most of us don’t document it – the reasons being aplenty and varied like lack of time, lack of positive energy, lack of communication skills, lack of interest and so on. Some even may shy away from making their thought-pieces published just because they fear public criticism or do not have the right exposure or confidence to handle criticism.

To me, bloggers are a new genre of curious intellectuals who are, unlike what they have been labeled as, ‘inadequate, pimpled and single’, by BBC journalist Andrew Man, revolutionizing ideation and creation of digital content.

Continue reading

New tool for fighting Internet censorship likely ineffective

International electronic communications are essential to global trade and relations. Censorship programs of some countries can make this seem impossible. Fortunately, they are developing ways to overcome these barriers.

In a post by Fox News, an announcement made by the Defcon Hacker’s Conference details how the U.S. government is using a program called Feed Over email to bypass China’s government censors. Sho Ho spoke of the product and said she hopes it will soon help gain support for new ideas in tense political climates.

Continue reading