Blog

July 2014

83

Estimated reading time: 3 minutes

At Quick Heal, we are always striving to make security more accessible and highly effective, be it on computers or smartphones. Over the last few years, this endeavor has naturally led us to secure millions of Android smartphones, thanks to the widespread surge of Android phones and their usage all...
0

Estimated reading time: 2 minutes

In this week’s IT security news, LinkedIn users are increasingly under threat of new phishing campaigns. A new form of ransomware has been discovered and several other interesting developments have taken place. Keep reading for some insights into these news stories. LinkedIn users under threat by new phishing campaign This...
43

Estimated reading time: 2 minutes

17 July, 2014 was but a fateful day for the passengers who boarded the Malaysian Flight MH17; scheduled to fly from Amsterdam to Kuala Lumpur. The plane crashed during its flight over eastern Ukraine, ending the lives of 298 passengers including the crew. While people all over the world are...
6

Estimated reading time: 3 minutes

In-app purchases have often been a scorn for parents of children who unknowingly carry out several purchases within their favorite apps or games. This in turn leads to high bills for these parents that gets credited to their online accounts and even leads to an increase in their data usage....
0

Estimated reading time: 3 minutes

This particular week brought some tragic news for many families and friends of the passengers who were flying on the Malaysian Airlines flight MH17. And cybercriminals did not stop making even this incident into a bait to trap their victims. Our thoughts and prayers are with the bereaved, and may...
4

Estimated reading time: 3 minutes

Everyone who works on the Internet today has an identity online and in many ways, this identity is what defines them in the virtual and cyber world. Many times though, malicious parties and hackers actively carry out what is known as identity theft and this can be highly debilitating for...
0

Estimated reading time: 2 minutes

Here is a quick look into the IT security news and industry relevant stories from the week gone by. Hybrid future of data is imminent With data security and privacy as high as ever, Gartner has boldly predicted that the physical location of data is becoming increasingly irrelevant. Instead, what...
63

Estimated reading time: 3 minutes

Without doubt, Gmail is the most popular and widely used email service all across the world today and maybe even of all time. Almost anyone who has Internet access has a functional email account, and more likely than not, an active Gmail account. Some of the features and services that...
1 Comment

Estimated reading time: 4 minutes

In business enterprises across the world, more and more employees are now bringing their own devices and eliminating the preexisting borders between personal and professional lives. It is not uncommon now to see people working and responding to work emails while on the move and even while on vacation. To...
0

Estimated reading time: 3 minutes

While we are all glued to our couches watching our favorite football teams crush one another, let’s direct our attention a bit towards some important IT security news and alerts for this week. An Embarrassing Password Revelation No example of irony can match what the security team of the FIFA...