Blog

Tips

  • 788
    Shares
 December 22, 2016
11_tips_to_do_secure_cashless_transactions

Estimated reading time: 2 minutes

In the wake of the demonetisation campaign, people are opting for cashless transactions for online banking, shopping, paying bills, booking tickets, etc. But, while this mode of payment may have brought some relief to the cash crunch in ATMs and banks, it has opened up new opportunities for cybercriminals. And...
  • 205
    Shares
 October 6, 2016

Estimated reading time: 3 minutes

October is observed as the Cyber Security Awareness Month. And we thought of celebrating it by sharing some essential dos and don’ts of Internet security with you. And here they are. The DOs 1. While you are banking, shopping or paying your bills online, check if the website’s URL begins...
  • 29
    Shares
 July 12, 2016

Estimated reading time: 3 minutes

The month of August will witness some of the best performances by world class athletes in 2016 Rio Olympics. Considering the magnitude of the event, the online scammers have made best use of the platform to launch phishing attacks, lottery scams, counterfeit offers, merchandising schemes and more. As athletes prepare...
  • 134
    Shares
 June 27, 2016
ATM_Skimming

Estimated reading time: 2 minutes

It so happens that a vacation taken by a cyber security expert turns out to be yet another eye-opener for many. While holidaying in Vienna, Austria, cyber security expert Benjamin Tedesco comes across a well-camouflaged ATM skimming machine. Before we continue, let us tell you a little about what is...
  • 52
    Shares
 June 21, 2016

Estimated reading time: 3 minutes

If anything, cybercriminals are an ambitious lot. They keep themselves busy in devising new methods to scam the Internet population. And malvertising is just one of their nefarious tricks. In this post, we will help you understand what is malvertising, how it works, and how you can protect yourself from...
  • 26
    Shares
 June 16, 2016

Estimated reading time: 3 minutes

Is your smartphone not as zappy as it used to be when you bought it? If yes, then you can blame low memory space for this. When your phone runs out of memory, it refuses to take any more pics or videos, install updates or run smoothly – all obvious...
  • 65
    Shares
 June 13, 2016
Phishing emails contain ransomware

Estimated reading time: 2 minutes

If you thought phishing emails are less dangerous, then you would be terribly wrong. According to a recent report, almost 93% of phishing emails now carry the ransomware malware. First, what is phishing? Phishing is an age-old trick used by scammers and hackers to trick people into revealing their personal...
  • 174
    Shares
 May 23, 2016

Estimated reading time: 2 minutes

Last week, popular business social networking site LinkedIn announced that over 100 million user passwords were compromised. This was followed by a strong advisory to users about changing their passwords. A brief flashback >> A few years ago, in 2012, LinkedIn was hit by a major hack that caused a...
  • 74
    Shares
 May 6, 2016

Estimated reading time: 4 minutes

Here’s a light, crisp refresher on 7 good computer security habits for you all. #1st Tip Lock your PC when you are away This is a no-brainer; yet, most of us may conveniently forget to do so. And we don’t realize its importance until some miscreant gets their hands on...
  • 2
    Shares
 May 2, 2016

Estimated reading time: 1 minute

Most malicious websites are designed to drop malware on your computer the moment you visit them. This type of an unexpected attack is known as a drive-by download. Sometimes, even trusted and harmless looking websites can do this to your computer. Quick Heal Browser Sandbox is an important security feature...