Blog

Spyware

  • 59
    Shares
 April 12, 2018

Estimated reading time: 2 minutes

Spyware refers to software that spy on your Internet browsing activities, record keystrokes, and collect almost any type of data including your personal information such as credit/debit card or banking details, login IDs and passwords. In this post, we share 8 tips to avoid a spyware attack and keep your...
  • 1
    Share
 June 2, 2014

Estimated reading time: 3 minutes

In a couple of our blog posts, many readers have posted a query on how they can block pop-up ads that appear on various websites that they visit. Through this blog post, we have answered the query with a few helpful tips. Advertisements have come a long way; from public...
 June 29, 2013

Estimated reading time: 2 minutes

6 Million Facebook Account Compromised! Facebook reported that a bug was responsible for exposing email addresses and phone numbers of as much as 6 million Facebook users. The company informed that the bug was a part of the Download Your Information (DIY) tool in Facebook, that allows the user to...
 January 9, 2013

Estimated reading time: 4 minutes

2012 has seen various malware threats and international cyberespionage tools evolve to new heights. However, the PC still remains the most accessible device for invading homes and planting malware. The number and nature of malware received by the Quick Heal Research & Development Labs in 2012 highlighted this fact. The...
 January 8, 2013

Estimated reading time: 3 minutes

The open-source nature of the Android platform is its biggest strength and Achilles heel at the same time. Android handsets constituted almost 72% of global smartphone sales in Q3 2012 and 1.3 million Android devices are activated worldwide every single day. This is a staggering market share that Android enjoys...
 October 19, 2012

Estimated reading time: 2 minutes

It was recently discovered that millions of ADSL routers were hacked in Brazil to create a large botnet chain. This is an unprecedented move that goes to show that not even our routers are safe from attackers. Many homes and offices use Wi-Fi routers for web access today so it...
 October 9, 2012

Estimated reading time: 2 minutes

Many people in India are unaware about Huawei and its large number of products that are sold here. These range from simple wireless modems to advanced networking equipment utilized by industries and other hardware manufacturers. Most of the USB dongles that are sold in the country also come from the...
 September 25, 2012

Estimated reading time: 3 minutes

We repeatedly speak about the different techniques that attackers use to infect machines with malware. We also provide precautions that users can take to protect themselves from malware and phishing threats. In this post we will highlight the different strains of malware that are seen in the wild and what...
 August 20, 2012

Estimated reading time: 2 minutes

Gauss is a highly complex and sophisticated online banking malware that belongs to the same family as Flame, Duqu and Stuxnet. Gauss seems to be updated version of Stuxnet malware. Similar characteristics of these malwares are as follows: Use encryption method (XOR) Command and control (C&C) servers Use .LNK exploit...