Blog

May 2013

101 Uses of Gadgets Without Quick Heal Contest

26

Estimated reading time: 1 minute

What if making your laptop into a dustpan or a bird house fetches you a cool prize? How awesome is that! Cutting the long story short, we have a contest for you, where “you” think of 101 crazy uses of your gadgets and “we” give you cool prizes. That’s right!...

Week’s Latest Security News and Updates from Around the World

3

Estimated reading time: 2 minutes

Here’s this week’s edition on some important and interesting news and updates on online security. Yahoo Japan Hacked – Officials Warned Users to Change Passwords After discovering a hacking attempt into its ID serves, Yahoo Japan has warned its users to change their passwords. According to the company, 22 million...

Trojan.Cidox targets IPL( i mean Initial Program Loader )

3

Estimated reading time: 2 minutes

IPL is now in news for different reasons. On the other side we see Initial Program Loader (IPL) – which is responsible for loading of Operating system is targeted by Trojan.Cidox. Although bootkit technology isn’t new, it plays an important role nowadays in attack scenarios against the Microsoft Windows platform....

Are Your Messages on Skype Private?

0

Estimated reading time: 2 minutes

If you are a Skype user, then you might not be delighted to know that Microsoft (which owns the software) is all eyes and ears about what you communicate with your peers. An experiment conducted by Ars Technica (a technology news and information website), with the aid of Ashkan Solanti...

Know the Risks of Using ATM and Online Banking

123

Estimated reading time: 3 minutes

As convenient and user-friendly as the ATM (automated teller machine) and online banking services are, they have their own share of security risks. This blog entails the security risks of using ATMs and online banking, and discusses some valuable safety measures users can take. Risks Involved with ATMs The greatest...

Work from Home Scam

51

Estimated reading time: 2 minutes

Yet another kind of social media scam that has come under the radar of security officials is the “work from home scam”. This blog explains how such scams work, and how can you steer clear from them. Work from home scams are mostly linked to people who are unemployed and...

Things You Should Keep off the Table of Facebook

2

Estimated reading time: 2 minutes

As a continuation to our previous post, where we had discussed the type of information one should not reveal on social networking sites like Facebook, this post tells you about some more important things that are better off without being shared online. Click Everything and Share! Pictures do express a...

This Week’s Roundup of the Latest Security News

0

Estimated reading time: 2 minutes

Here’s a quick roundup of this week’s latest news on what cyber criminals are up to and what security officials are doing to tackle them. New York State Attorney General advises phone giants to beef up security In what may be called a thoughtful step to curb the black market,...

How Much Should You Reveal on Facebook?

  • 1
    Share
46

Estimated reading time: 3 minutes

Oh my God, you do not have a Facebook account? What kind of medieval world do you live in? I have had it since the whole thing started, and now it knows everything about me, more than anyone. Right from munching on a burger at a new food joint in...

The great 45 million ATM heist, why it is not surprising.

11

Estimated reading time: 2 minutes

Background In case if you do not know, last week several arrest were made in New York city in connection to sophisticated cybercrime attack where cyber criminals made with $45 million in ATM withdrawal scam involving prepaid debit cards. The arrested thieves were small part of a well organized global...