It’s Social Media Day! Here are 10 Tips for Safe Social Networking

Social Media day was launched by the popular website Mashable back in 2010 on June 30th. For obvious reasons, this day recognizes the impact social media has had and is having on global communication and the Internet community as a whole. And we thought what could be better to celebrate this day than sharing some […]

ATM_Skimming

4 tips on how to protect yourself from ATM skimming

It so happens that a vacation taken by a cyber security expert turns out to be yet another eye-opener for many. While holidaying in Vienna, Austria, cyber security expert Benjamin Tedesco comes across a well-camouflaged ATM skimming machine. Before we continue, let us tell you a little about what is ATM skimming? For those who […]

What is Malvertising and How to Stay Away from it?

If anything, cybercriminals are an ambitious lot. They keep themselves busy in devising new methods to scam the Internet population. And malvertising is just one of their nefarious tricks. In this post, we will help you understand what is malvertising, how it works, and how you can protect yourself from it. What is malvertising? Derived […]

5 Easy Tips to Free up Space on Your Android

Is your smartphone not as zappy as it used to be when you bought it? If yes, then you can blame low memory space for this. When your phone runs out of memory, it refuses to take any more pics or videos, install updates or run smoothly – all obvious signs that the old boy […]

Phishing emails contain ransomware

Phishing emails just got more dangerous! 93% of them contain ransomware

If you thought phishing emails are less dangerous, then you would be terribly wrong. According to a recent report, almost 93% of phishing emails now carry the ransomware malware. First, what is phishing? Phishing is an age-old trick used by scammers and hackers to trick people into revealing their personal and financial information. This infographic […]

smartphone security

Use Smartphones Only in Emergencies – Government Instructs Ministries to Avoid Loss of Sensitive National Data

Just like the private sector, the Government has been encouraging its employees to use smartphones for better collaboration within departments. This rapid adoption of smartphones and Internet services in Government organizations might lead to situations where national security could be compromised by a simple data breach. This is a concern which has recently led the […]

Cyber Security Challenges and Emerging Reforms in the Indian Banking Sector

The Indian banking industry has evolved majorly in the past few years owing to technological innovations. Public and privatized banks are allotting bigger budgets towards acquiring and building IT infrastructure and have leveraged IT across all banking operations. Banks constantly face the business challenge of meeting customers’ expectations and improvising on their services and offerings. […]

Infostealer Campaign detected in the wild

Quick Heal Threat Research Lab has recently observed an active cybercrime campaign designed to steal user info. The campaign has been noticed to make use of three keyloggers (malicious software that records information entered by a user on their computer keyboard) iSpy logger, Predator logger and Knight Logger. These software are easily available on the […]

Have a LinkedIn account? Better change your password!

Last week, popular business social networking site LinkedIn announced that over 100 million user passwords were compromised. This was followed by a strong advisory to users about changing their passwords. A brief flashback >> A few years ago, in 2012, LinkedIn was hit by a major hack that caused a breach of about 6.5 million […]

The New and Latest Version of Quick Heal is here!

Our readers would be glad to know that the new and enhanced version of the Quick Heal product series is here! Based on the various feedback and suggestions received from our users across the world, we have brought in some major enhancements to this year’s product line and also introduced some new features too. The […]