Blog

Cyber crime

 December 24, 2015

Estimated reading time: 3 minutes

It is time to say goodbye to 2015 and welcome 2016. New Year wishes, greetings and celebrations are on its way. And, so are New Year resolutions and predictions. Quick Heal family wishes you a Merry Christmas and a safe and secured New Year 2016. 2015 was an eventful year...
 January 6, 2015

Estimated reading time: 3 minutes

An in-depth study has been released by ASSOCHAM-Mahindra SSG and according to this report, cyber-crime incidents in India are set to double to almost 300,000 in 2015. The primary targets of these crimes are going to be entities in the financial space, security establishments for national defense and the integrated...
 August 11, 2014

Estimated reading time: 3 minutes

A massive data breach was discovered in Russia recently wherein more than 1.2 billion passwords have been stolen. This is one of the biggest data breaches in recent memory, and we recommend that online users change their passwords immediately. Read on for other IT security news from the week gone...
 March 8, 2014

Estimated reading time: 2 minutes

There are several interesting new developments in the security world, and here are some of the news stories from the week gone by that you should be looking at. Facebook Whatsapp deal for $19 billion still not completed due to privacy concerns If you have doubts about your private data...
 March 6, 2014

Estimated reading time: 3 minutes

Modern business enterprises deal with large stacks of crucial data that need to be processed at high speeds. As a result, security is often a blind spot for them. Basic enterprise security tips are overlooked for the sake of convenience and this eventually leads to security breaches or data loss....
  • 1
    Share
 April 15, 2013

Estimated reading time: 2 minutes

Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out certain actions or giving away confidential information is known as Social Engineering. And this is a rampant form of exploitation. Why? If you can get access to anything you want just by...
 April 6, 2013

Estimated reading time: 4 minutes

This post is in continuation with our previous post on Instagram and will discuss how you can control your privacy in the app. In Instagram the key word is ‘public.’ Once an Instagram profile has been created, anyone can browse these online profiles and “follow” other Instagram users. Here comes the...
 April 3, 2013

Estimated reading time: 3 minutes

In an earlier post we talked about various apps and the risks associated with them. In these subsequent posts, we will scratch the surface a little bit and dig a little deeper to understand the privacy implications of one app in particular – Instagram. Now, that our very own Big...
 March 2, 2013

Estimated reading time: 1 minute

Personal information of app users leaked on Google Play People who still disregard Android security and do not take privacy controls over the platform seriously, will be alarmed to learn this piece of news. An Australian app developer recently discovered that he had complete access to personal information of the...