Blog

Security

  • 65
    Shares
 July 22, 2016

Estimated reading time: 3 minutes

We love options! But smart people also love the authenticity of the options available. Most of us rely on Google Play Store or Windows Store to download our favorite apps because they are the official pre-installed app for Android and Windows devices and hence, a trusted source. Google Play or...
  • 53
    Shares
 July 13, 2016

Estimated reading time: 2 minutes

You might have heard of the Godless Android malware that surfaced last month. This post explains some important facts around the malware, and how you can stay away from it. What is the Godless Malware? Carrying a bit of an intimidating name, ‘Godless’ is a malware that targets Android phones...
  • 29
    Shares
 July 12, 2016

Estimated reading time: 3 minutes

The month of August will witness some of the best performances by world class athletes in 2016 Rio Olympics. Considering the magnitude of the event, the online scammers have made best use of the platform to launch phishing attacks, lottery scams, counterfeit offers, merchandising schemes and more. As athletes prepare...
  • 39
    Shares
 June 30, 2016

Estimated reading time: 4 minutes

Social Media day was launched by the popular website Mashable back in 2010 on June 30th. For obvious reasons, this day recognizes the impact social media has had and is having on global communication and the Internet community as a whole. And we thought what could be better to celebrate...
  • 52
    Shares
 June 21, 2016

Estimated reading time: 3 minutes

If anything, cybercriminals are an ambitious lot. They keep themselves busy in devising new methods to scam the Internet population. And malvertising is just one of their nefarious tricks. In this post, we will help you understand what is malvertising, how it works, and how you can protect yourself from...
  • 44
    Shares
 June 1, 2016

Estimated reading time: 3 minutes

The Indian banking industry has evolved majorly in the past few years owing to technological innovations. Public and privatized banks are allotting bigger budgets towards acquiring and building IT infrastructure and have leveraged IT across all banking operations. Banks constantly face the business challenge of meeting customers’ expectations and improvising...
  • 63
    Shares
 May 16, 2016

Estimated reading time: 1 minute

Our readers would be glad to know that the new and enhanced version of the Quick Heal product series is here! Based on the various feedback and suggestions received from our users across the world, we have brought in some major enhancements to this year’s product line and also introduced...
  • 74
    Shares
 May 6, 2016

Estimated reading time: 4 minutes

Here’s a light, crisp refresher on 7 good computer security habits for you all. #1st Tip Lock your PC when you are away This is a no-brainer; yet, most of us may conveniently forget to do so. And we don’t realize its importance until some miscreant gets their hands on...
  • 2
    Shares
 May 2, 2016

Estimated reading time: 1 minute

Most malicious websites are designed to drop malware on your computer the moment you visit them. This type of an unexpected attack is known as a drive-by download. Sometimes, even trusted and harmless looking websites can do this to your computer. Quick Heal Browser Sandbox is an important security feature...
 April 11, 2016
locky_ransomware

Estimated reading time: 3 minutes

‘Locky’ is the latest addition to the ransomware family. It has an interesting name and carries the same nastiness. Read more from the post below. What is the Locky Ransomware? Locky is a new file-encrypting ransomware malware. It does two things: Encrypts the files it finds in the PC it...