Blog

February 2015

Lenovo Users – This is how you can remove the Superfish Adware

2

Estimated reading time: 3 minutes

In case you are unaware, Lenovo has been shipping some of its consumer notebooks with a  preinstalled adware called Superfish. This software makes it possible for hackers to steal sensitive user data like passwords, banking information, etc. Scroll down to know more about this adware and how to remove it...

Online Banking Users, Beware of the Cridex Worm!

  • 1
    Share
2

Estimated reading time: 2 minutes

There is a computer worm on the loose that steals personal login ID and passwords. This worm is known to target users of online banking and social media sites like Facebook, Twitter, etc. Scroll down to know more about this worm and how you can stay safe against it. The...

10 Tips to Stay Safe Against Cricket World Cup Online Scams

56

Estimated reading time: 2 minutes

This Cricket World Cup, stay safe against hackers and online scammers by following these few simple security measures. If there is anything that the entire world eagerly awaits after FIFA World Cup, it is the ICC Cricket World Cup. Held every four years, it is rated as one of the...

How to Reset Your Browser – Chrome, Firefox & Internet Explorer

35

Estimated reading time: 3 minutes

Several of our readers often write in to us asking about popup ads that cannot be disabled, adware applications that take over the default search engine and home page of their browsers and other such questions. In cases where running a scan and deleting the malicious program from the PC...

Beware of Fake WhatsApp Notifications!

  • 1
    Share
70

Estimated reading time: 2 minutes

A fake WhatsApp notification email is doing the rounds on the Internet, tricking users into visiting a phishing website. Hackers are targeting Internet users with a fake WhatsApp notification email that pretends to be from WhatsApp. The email notifies the user about a new message and presents them with a...

Alert: Ransomware Infections on the Rise

91

Estimated reading time: 6 minutes

Overview: Over the last year or so, there has been tremendous growth in the number of ransomware attacks that have been spotted in the wild. Cybercriminals have effectively cracked this ‘business model’ and are generating a significant amount of money through this attack mechanism. What was once an attack technique...

The State of Android Malware in 2014

7

Estimated reading time: 3 minutes

In the year 2014, Android usage and malware saw an exponential rise vis-à-vis preceding years. Quick Heal Labs detected close to 3 million malware samples throughout the year and several new attack vectors and techniques were propagated by malware authors throughout the globe. Some malicious apps were even spotted in...

The Best Password Managers and Why you Should Get One

15

Estimated reading time: 4 minutes

When it comes to web passwords, an average Internet user holds about 26 different accounts, but only has 5 different passwords to access them. This is an alarming statistic as it leaves almost all online accounts of users vulnerable to hackers and password leaks. Now we understand that creating passwords...