July 2015

Are you ready for the Quick Heal Crossword Contest?


Estimated reading time: 1 minute

For all our avid blog readers, we are bringing in the Quick Heal crossword contest that would be conducted every month on our blog. The crossword will be based on some common computer security and technology terms. The first entry with the completed crossword will be the winner of a...

Google Timeline: A Scary Feature That You Should Turn Off


Estimated reading time: 2 minutes

Have you ever got the feeling that you are being watched no matter where you go? If you own an Android smartphone, then Google may have just revealed the reason behind that feeling. Earlier this week, Google announced a new Maps tool – Your Timeline. This tool is designed to...

Quick Heal has released the Software Update for Windows 10 Compatibility

  • 2

Estimated reading time: 2 minutes

Many of our readers might recall that we had spoken of the ‘Windows 10 upgrade’ release and its compatibility with Quick Heal in an earlier blog post. We are glad to inform you that we have released the software update, downloading which will make your Quick Heal copy (v16.00) compatible...

Tia and the Online Stranger: A Cyber Safety Story


Estimated reading time: 1 minute

As fascinating as the online world is, it is riddled with dangers and pitfalls. More than adults, it is impressionable kids and teenagers who remain the most vulnerable victims of online predators. We have heard about horrid stories of how kids are tricked into resorting to taking undesirable actions against...

How Point of Sale (PoS) Malware Steals Credit Card Data


Estimated reading time: 3 minutes

The Quick Heal Quarterly Threat Report for the second quarter of 2015 indicated a massive rise in the number of malware samples that afflicted the Windows platform across the world. This trend can be attributed to the fact that malware authors have started propagating their malicious software variants to all...

How Android Malware Evolved Over Q2 2015


Estimated reading time: 3 minutes

The recently released Quick Heal Quarterly Threat Report for Q2 2015 had some interesting trends and insights into the IT security industry. The report highlights in-depth statistics and analysis of all malware samples that were detected in the months of April, May and June 2015. The platforms that were studied...

Security Predictions for the Internet of Things (IoT)


Estimated reading time: 4 minutes

Much hype has been going around the term ‘Internet of Things (IoT)’. Some may have just heard about it, some may have read about it, and some may be completely aloof about the term altogether. To put it differently, IoT has not yet rung a bell for enterprise owners and...

Android Security Tips: Get the Most Out of Your Apps


Estimated reading time: 3 minutes

When was the last time you went online and searched for an app to download on your Android phone? Are you sure you are downloading your apps from reliable sources or are you putting your Android phone at risk by downloading apps from dangerous third-party sources? This post on easy...

4 Easy Steps to Get Rid of Unwanted Toolbars


Estimated reading time: 2 minutes

Is your Internet browser suddenly riddled with toolbars you have no clue about? Well, this is a common occurrence with almost every Internet user. Here we give you 4 easy steps to get rid of unwanted toolbars from your system. 1. Head for the Control Panel Did you start noticing...