#Security Take your browser security to the next level! Today, almost every computer user leverages a variety of web browsers to surf the internet — Microsoft Internet Explorer, Swapnil Nigade / 6 years Comment (0) (27)
#Security Why secure your IoT Devices? Introduction to IoT This blog describes one of the current disruptive technologies in the market, i.e. IoT (Internet of Things) Sachin Bobade / 6 years Comment (0) (19)
#Security #Tips HorseDeal Riding on The Curveball! It’s surprising to see how quickly attackers make use of new vulnerabilities in malware campaigns. Microsoft recently patched a very Jayesh kulkarni / 6 years Comment (0) (15)
#Security A sloppy click can exfiltrate your important data! Phishing email still remains one of the top malware propagation medium. Recently, we came across an interesting phishing email containing couple Anant Pulgam / 6 years Comment (0) (16)
#Security Ako Ransomware targeting businesses using RaaS Ako Ransomware targeting businesses using RaaS Quick Heal security researchers recently observed ransomware that uses RaaS (Ransomware as a Service) Shriram Munde / 6 years Comment (0) (18)
#Security What’s new in macOS Catalina ‘Security and Privacy’? Apple released macOS 10.15 (Catalina) on 7th Oct 2019 and now it is publicly available for download. With multiple features Amrapali Nimgire / 6 years Comment (0) (41)
#Security The Free Mobile Anti-virus you are using can be a Fake! Quick Heal Security Labs recently spotted multiple Fake Antivirus Apps on Google Play Store. What’s more alarming, is that one Prachi Sudame / 6 years Comment (22) (14)
#Security Beware! Email attachments can make you victim of spear phishing attacks In the last few months, we’ve seen a sudden increase in Spear Phishing attacks. Spear phishing is a variation of a phishing Prashant Tilekar / 7 years Comment (0) (12)
#Security #Tips CVE-2019-11815: Experts discovered a privilege escalation vulnerability in the Linux Kernel Red Hat engineers and experts discovered a memory corruption vulnerability in Linux kernel, which is basically a flaw while implementation Ganesh Lakariya / 7 years Comment (2) (20)
#Security Miners snatching open source tools to strengthen their malevolent power! From the last one year, Quick Heal Security Labs has been observing a boost in the number of mining malware. Anant Pulgam / 7 years Comment (0) (30)