Blog

July 2013

Why SMEs Need to get Serious about their IT Security?

2

Estimated reading time: 3 minutes

What’s common between most small and medium enterprises? It is a false sense of IT security that they have. Most of these industries assume that they are too small to risk any cyber attack, and it is this very notion that cyber crooks take advantage of. This post explains why...

Obama’s Speech Spreads Malware

4

Estimated reading time: 3 minutes

Have you recently received any news which goes, “Obama speech to urge ‘refocus’ on economy” via any unsolicited email, which seems to have been sent by CNN? If yes, then let’s hope you have not clicked any of the links embedded in the email. This feat is yet another of...

They come, they hide, and they mess up – Android.Obad and Android.Fakedefender

50

Estimated reading time: 4 minutes

It looks like malware writers are leaving no stone unturned to target the Android platform. They are exploring every opportunity to do so; one such opportunity recently popped up in the form of two malwares viz. Android.Obad and Android.Fakedefender. Know what these malware are and how they work, from the...

How to Recognize and Dodge Email Scams?

12

Estimated reading time: 3 minutes

Internet scams are spreading rampantly across the world. And guess what the most popular carrier of such scams is? No prize for guessing – our beloved internet darling, email. This post gives you a quick read on some of the most common online scams that are spread via emails. 1....

A Look at this Week’s Latest Security News and Updates

0

Estimated reading time: 2 minutes

Truecaller Gets a Bad Cyberattack Call Apparently, the website of popular online phonebook app, Truecaller, experienced a cyberattack, letting hackers gain unauthorized access to some data. The company has confirmed the same in its official blog. It seems, the Syrian Electronic Army is responsible for the cyberattack. News is up...

Lost your Laptop? Let Quick Heal Track it for you!

88

Estimated reading time: 1 minute

What are the odds of getting back a lost or a stolen laptop? Sure, there are many types of laptop tracking software available on the market, yet, reportedly, 46% of lost laptops have no anti-theft protection. Why so? Well, this could be because: Most might think that such software is...

No More Support for Windows XP from April 2014

6

Estimated reading time: 1 minute

Here’s a reminder for all our readers – Microsoft will no longer be providing any services to Windows XP operating system from April 8, 2014. In other words, machines still running this OS, will no longer receive security updates, and will be out of all kinds of support (paid or...

Chat Room Dangers that Kids and Teens are exposed to

12

Estimated reading time: 3 minutes

Chat rooms can be a great online space to hang out for kids and especially teens who share similar interests, thoughts or experiences. But at the same time, the same place can be a dark and dingy alley infested with online predators. This post gives you an insight into some...

Weekly Roundup of the Latest Security News and Updates

0

Estimated reading time: 2 minutes

Pune Cops Shut Down 25 Suspicious Bank Accounts The infamous Nigerian scam is yet again making the headlines, and this time in the city of Pune. Reportedly, many people have been duped by miscreants running this scam. The fraudsters used text messages, emails, and websites to trick their targets. Fortunately,...

The Underlying Threats to Enterprise Security

2

Estimated reading time: 3 minutes

When it comes to enterprise security, there’s a lot at stake; consumers, operations, business relationships, work force, brand image, and financial status, to name a few. While the number of enterprise security threats can be in hundreds, in this post, we have discussed some of the most critical ones. Top...