Rahul Thadani

About Rahul Thadani

Rahul is a web enthusiast and blogger, and has been writing about the computer security industry for the last three years. Following the latest technology trends, he has written several articles and blog posts related to the antivirus industry.

Delete Your WhatsApp Chats and Become a Criminal

 September 22, 2015

Estimated reading time: 3 minutes

The Government recently released a draft of National Encryption Policy which has got a lot of coverage in the press over the last few days. Very few people actually agree with the purpose of this policy since it threatens to leave hordes of personal user data vulnerable to spying by...

Two Mistakes You’re Making While Charging Your Smartphone Battery

 September 15, 2015

Estimated reading time: 3 minutes

One of the most common complaints that anyone who uses a smartphone has, is regarding the battery of the device. While our new phones are packed with powerful features, ultrafast processors and are also as thin as a wafer, all this leads to a situation where the battery life of...

Why it is Unsafe to Use Pattern Locks to Protect Your Smartphone

  • 1
 September 11, 2015

Estimated reading time: 3 minutes

When it comes to smartphone security, one of the first things that we recommend is to switch on the screen lock feature. A surprisingly large number of people are still using their phones without any kind of screen lock enabled and this is a major security loophole that leaves their...

The Biggest Apple iPhone Malware Hack Ever

 September 1, 2015

Estimated reading time: 2 minutes

Ever since the first iPhone released 8 years back, it has been surprisingly secure. There have been very few instances of malware and hacks on these devices, especially in comparison to the more open and less secure Android platform. From time to time though, a hack on iPhones comes along...

The 6 Biggest Data Breaches of 2015 So Far

 August 25, 2015

Estimated reading time: 4 minutes

For those of you who are following the news about the leakage of Ashley Madison’s (an American adult dating site) confidential data, this blog post will highlight some more notable data breaches from the year 2015, so far. We are only 8 months into the year 2015 and there are...

See How Many Companies Track You on Facebook

  • 1
 August 21, 2015

Estimated reading time: 3 minutes

The benefits of Facebook are known to each of the millions of its users. However, this ‘free’ service does come at a price. After all, Facebook is now a listed company and it needs to find ways to monetize its services and make them profitable. While individual users do not...

Facebook Security: Easy Tips for User Privacy

  • 1
 August 11, 2015

Estimated reading time: 3 minutes

One of the biggest complaints that people have against Facebook is that their privacy can be compromised at any time. While the entire purpose of Facebook and social networks is to share your updates with friends and family, many people often lose track of where to draw the line. A...

Phishing Alert: Beware of Malicious Windows 10 Upgrade Emails

 August 5, 2015

Estimated reading time: 2 minutes

As has been reported in the past, malware authors and cyber criminals are very quick to mine trending topics over the Internet in order to trick people and infect their machines. Windows 10 has been making waves over the web off late with every Windows user curious to see what...

Google Timeline: A Scary Feature That You Should Turn Off

 July 28, 2015

Estimated reading time: 2 minutes

Have you ever got the feeling that you are being watched no matter where you go? If you own an Android smartphone, then Google may have just revealed the reason behind that feeling. Earlier this week, Google announced a new Maps tool – Your Timeline. This tool is designed to...

How Point of Sale (PoS) Malware Steals Credit Card Data

 July 17, 2015

Estimated reading time: 3 minutes

The Quick Heal Quarterly Threat Report for the second quarter of 2015 indicated a massive rise in the number of malware samples that afflicted the Windows platform across the world. This trend can be attributed to the fact that malware authors have started propagating their malicious software variants to all...