Internet security

Photo: iStockphoto.<br />
It isn’t always easy for a user to figure out just what information or functions are being accessed, what data is then being sent back to the developers’ servers—and what happens to that data once it gets there. Photo: Bloomberg<br />

What your mobile may be giving away

5 min read . 28 Sep 2014
The worm can spread through file-sharing programs and is capable of downloading more threats and misleading applications on to a compromised computer. Photo: Priyanka Parashar/Mint<br /> (Priyanka Parashar/Mint)

India catches the Beebone virus

2 min read . 24 Jul 2013
Privacy settings are tedious, but well worth the effort<br />

Get rid of digital clutter

3 min read . 16 Jul 2013