Blog

August 2015

It’s that time of the month when we come up with our monthly Quick Heal Crossword Challenge! Our first contest was bombarded with entries from our readers and fans. And this time, to make things interesting, we have elevated the difficulty level. As always, the first entry with the completed...
For those of you who are following the news about the leakage of Ashley Madison’s (an American adult dating site) confidential data, this blog post will highlight some more notable data breaches from the year 2015, so far. We are only 8 months into the year 2015 and there are...
The benefits of Facebook are known to each of the millions of its users. However, this ‘free’ service does come at a price. After all, Facebook is now a listed company and it needs to find ways to monetize its services and make them profitable. While individual users do not...
Like oasis is to a deranged traveler in a desert, public WiFi is to people who are constantly on the move and need to get things done. While having easy access to public WiFi networks is convenient, it can put your data at risk of being snooped by attackers, simply...
When it comes to advanced threat protection many enterprises now a days are relying on Advanced Threat Protection sandbox based gateway appliances. Over past few years spear phishing attacks through highly targeted messages had been implemented in many data breaches. More than 90% of the successful attacks on enterprise networks...
One of the biggest complaints that people have against Facebook is that their privacy can be compromised at any time. While the entire purpose of Facebook and social networks is to share your updates with friends and family, many people often lose track of where to draw the line. A...