Blog

August 2013

0

Estimated reading time: 2 minutes

The Largest Cyber-Attack hits China On 25th August China suffered the largest cyber-attack ever. The news was posted on the website of the China Internet Network Information Center (CNNIC). Reportedly, the attack begun at 2 pm local time paralyzing many websites in the country, before it got worse by 4...
6

Estimated reading time: 1 minute

Guess what threats your precious Android is exposed to? Crooks, who want to steal it, and miscreants who want to know what stuff is in it? Wait, are we missing something here? Of course, malware attack – the biggest threat of all. Apparently, in 2012, Android turned out to be...
39

Estimated reading time: 3 minutes

When mankind was struggling with compact disks and floppy disks, the USB drive came into the digital world as a long sought relief. It made storing and transferring of data way easier. But as useful as these tiny gizmos are, they can also be a potential carrier of malware, and...
0

Estimated reading time: 2 minutes

We are all Transparent Now! If you are on Tumblr, then very soon you might be able to follow the official Tumblr blog of the US National Security Agency (NSA). President Barack Obama expressed that this platform would shake off the iron curtain between the US intelligence community and the...
2

Estimated reading time: 3 minutes

To boost brand image and increase productivity, more and more enterprise sectors are exploiting avenues such as cloud technology, social media platforms, and bring your own device (BYOD) to name a few. And when such is the scenario, ignoring the importance of IT security can spell disaster. Here, we have...
1 Comment

Estimated reading time: 2 minutes

Google Sleeps for 5 minutes, 40% of Internet Traffic Goes Kaput Google is not called the Big G for nothing. Google and all of its services suffered a downtime for up to five minutes last Friday. This caused global Internet traffic to drop by about 40%. It is estimated that...
64

Estimated reading time: 1 minute

“Creating a better future Requires creativity in the present.” – Matthew Goldfinger The Quick Heal 2014 series is in the making, and to sculpt the product into a masterpiece, we require your digital brain waves. Join Quick Heal’s Beta Testing program, get first-hand experience of our products, interact with our...
226

Estimated reading time: 3 minutes

Has your computer become sluggish with time? Or does it seem as if it is playing in an ultra, slow motion video? This post outlines some of the most common factors that slow down your computer with time. Why can a Snail Outrun your Computer?   Poor RAM RAM (random...
3

Estimated reading time: 3 minutes

Whenever we talk of IT security, the first thing people look for is a security software. But what about physical intrusion? What about the physical security of the digital assets? Are they being safeguarded? Let us look what measures you must take to physically secure your network and its components....
78

Estimated reading time: 4 minutes

Ransomware is called so, because it holds the victim’s computer hostage in return for money (ransom) from the user. This post tells you about ransomware, and how Quick Heal helps you deal with it. What is Ransomware? Ransomware is a sophisticated malware. It hijacks the victim’s system and renders it...