Blog

Mobile devices

At Quick Heal, Our Products are Really Priceless!

 June 27, 2014

Estimated reading time: 1 minute

At Quick Heal, our endeavor is to provide ‘Mobile Security for all’. Very soon, Quick Heal Mobile Security will be bringing in new and enhanced features. Beyond that, we also have a little surprise for you. Get a sneak peek at what these features are and what are we up...

Android Devices – One More Reason Why Your Business Needs End Point Security

 February 12, 2014

Estimated reading time: 2 minutes

As much as Android is loved all over the world (well, not all but most), it has its own follies. Yes, it is an open platform, it gives away loads of awesome apps for free, and it is open for customization. So, where’s the folly? Most users must have noted...

Apps that every parent should know about

  • 1
    Share
 June 11, 2013

Estimated reading time: 3 minutes

Beginning of the school year is a delicate time for children and youth. If academic expectations are not enough, children seem to believe that they are expected to live up to peer-pressure as well. This is always accompanied by insecurities and complexes. There are helplines, guides and mentors that exist...

Instagram: What you need to know – Part 2

 April 6, 2013

Estimated reading time: 4 minutes

This post is in continuation with our previous post on Instagram and will discuss how you can control your privacy in the app. In Instagram the key word is ‘public.’ Once an Instagram profile has been created, anyone can browse these online profiles and “follow” other Instagram users. Here comes the...

Instagram: What you need to know

 April 3, 2013

Estimated reading time: 3 minutes

In an earlier post we talked about various apps and the risks associated with them. In these subsequent posts, we will scratch the surface a little bit and dig a little deeper to understand the privacy implications of one app in particular – Instagram. Now, that our very own Big...

Future Watch VII: War-texting threatens the future of Internet of things

 February 25, 2013

Estimated reading time: 3 minutes

At Quick Heal, we persistently look out for potential security threats that can lead to data breaches in the future. The rise of the ‘Internet of Things’ and omnipresent wireless connectivity for miscellaneous items is slowly opening up new attack avenues for hackers. A new kind of hacking attack has...

Massive Android botnet invades China: Could India be the next target?

 January 21, 2013

Estimated reading time: 3 minutes

A massive Trojan botnet has been discovered in Android devices in China and this serves as a timely reminder of the growing vulnerability of the Android platform. Staggeringly, this botnet has infected more than 1 million Android devices that function in China. The high vulnerability of Android devices in China...

Spam SMS messages on the rise: Quick Heal mobile threat detection numbers

 January 16, 2013

Estimated reading time: 2 minutes

In September 2012, Quick Heal launched an initiative for mobile users to forward suspicious SMS messages to a predesignated number. We received an impressive response as a lot of mobile users actively forwarded their spam messages and contributed towards this cause. The number to forward any suspicious SMS messages to...

The growing threat of mobile malware: Top Android malware families of 2012

 January 8, 2013

Estimated reading time: 3 minutes

The open-source nature of the Android platform is its biggest strength and Achilles heel at the same time. Android handsets constituted almost 72% of global smartphone sales in Q3 2012 and 1.3 million Android devices are activated worldwide every single day. This is a staggering market share that Android enjoys...

Security news and updates from the last week

 December 21, 2012

Estimated reading time: 2 minutes

Major security flaw found in Samsung devices, Samsung working on solution Samsung manufactures the Exynos 4 quad-core and dual-core chips for its flagship products like Samsung Galaxy S3 and the Galaxy Note II. However, a security flaw has been discovered in these SoC (system on a chip) processors that makes...