Online shopping: It is also known as e-shopping in which the purchases made online either by computers or SmartPhones. You can shop online with or without full authentication . E-shopping or online shopping or e-store are all virtual types of stores which allow customers to buy products or services over the internet. It is convenient for the people to shop online without spending their valuable time in markets. But There is risk in ordering things online as Information about user’s activity on the Web is being recorded and there will be privacy losses. Many users are not aware about it. Web users leave a “data shadow” with information about what they read, where they shop, what they buy, whom they correspond with and so on. Mantras to shop online safely: Before Placing An Order Carefully read the terms and conditions, including the small print. These terms and conditions should be available on the merchant’s website. Check t...
Mobile Securit y Mobile security has become increasingly important as more & more users & business use smartphones to communicate. But smartphones collect & compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the users. All smartphones,as computers,can be the target of attacks. It can be done by SMS,MMS,Blueto oth & GSM. 3 main targets for attackers:- Data : smartphones are devices for data management, and may contain sensitive data like credit card numbers, authentication information, private information, activity logs (calendar, call logs) Identity: smartphones are highly customizable, so the device or its contents can easily be associated with a specific person. Availability: A ttacking a smartphone can limit access to it and deprive the owner of its use. Main Sources:- Professionals, whether commercial or military, who focus on the three targets mentioned above...