Blog

November 2018

8 reasons not to count on your expired antivirus software to protect you!!

  • 42
    Shares
7

Estimated reading time: 2 minutes

You are at your computer, engaged in some important work and suddenly a message pops up on the screen, “Your Antivirus software license has expired”. You conveniently choose to ignore the notification, intending to get back to it whenever you get free, but, you never do! What Happens when Antivirus...

Beware of getting scammed during Black Friday & Cyber Monday SALE!!

  • 8
    Shares
0

Estimated reading time: 2 minutes

  As holiday shoppers gear up for a shopping spree on Black Friday and Cyber Monday, it’s important to be on alert to protect yourself from getting scammed. Here are few tips to help you enjoy a carefree and scam free holiday shopping season: Do not get tricked by similar...

Teaching kids the good, the bad and the ugly of the Internet

  • 63
    Shares
13
happy-childrens-day-cybersecurity-internet-safety-tips

Estimated reading time: 3 minutes

This children’s day let’s talk about one of the most relevant topics for kids these days- the Internet! Children spend a lot of their time doing homework, talking to friends or playing games on the internet. For parents, it is more important than ever to teach their kids early on how...

This Diwali gift your kids online safety with parental control

  • 55
    Shares
26

Estimated reading time: 3 minutes

Diwali holidays are just round the corner and your kids might have already received their holiday assignments. But, the kids are more excited about the fact that they will now have ample time to browse on the internet. While you want your kids to really enjoy the holidays, there’s a...

Obfuscated Equation Editor Exploit (CVE-2017-11882) spreading Hawkeye Keylogger

  • 15
    Shares
0

Estimated reading time: 6 minutes

Cyber-attacks through phishing emails are increasing and generally, attackers use DOC embedded macros to infiltrate victim’s machine. Recently Quick Heal Security Labs came across a Phishing e-mail sample which uses Microsoft’s equation editor exploit to spread Hawkeye keylogger. Cybercriminals use different techniques to steal confidential data. Now they are offering...