Blog
Rajiv Singha

About Rajiv Singha

Rajiv is an IT security news junkie and a computer security blogger at Quick Heal. He is passionate about promoting cybersecurity awareness, content and digital marketing, photography, gaming, and gardening.

This Week’s Latest News on IT Security and Updates

 September 21, 2013

Estimated reading time: 2 minutes

Microsoft warns Users of Critical Internet Explorer Vulnerability All supported versions of Internet Explorer, as reported by Microsoft, have a new security vulnerability. This security flaw can allow a hacker to use remote code execution (RME) and gain access to the victim’s computer. Incidents of malwares exploiting IE 8 and...

Critical Security Alert for Internet Explorer Users by Microsoft

 September 19, 2013

Estimated reading time: 3 minutes

The Redmond Giant has issued a critical security advisory in the interest of Internet Explorer users. Reports are in that, a security vulnerability in all supported versions of IE has been let loose. What is the Vulnerability? In its official security advisory, Microsoft has reported the vulnerability to be a...

This Week’s Dose of Latest IT Security News and Updates

 September 13, 2013

Estimated reading time: 2 minutes

Grand Theft Auto 5 for PC is finally here! Wait, it’s a Malware! Grand Theft Auto 5 is set to release on 17 September, 2013. The release is for the Xbox 360 and PlayStation 3, and not for PC. But a torrent claiming to be the PC version of GTA...

This Week’s Quick Bytes on IT Security News and Updates

 September 7, 2013

Estimated reading time: 3 minutes

2,900 Online Banking Infections Hit India in the Second Quarter of 2013 Reportedly, the second quarter of 2013 witnessed a whopping 1,45,000 online banking infections globally. 2% of this figure, which comes to 2,900, appears to have occurred in India. Security analysts were able to detect a malware that redirects...

Types of Facebook Posts you Must Never Click

  • 1
    Share
 September 3, 2013

Estimated reading time: 3 minutes

Facebook – the most popular online space where people share their love, humor, agony, and all sorts of emotions. And in the hustle of all such emotions, cyber criminals slither in their misdoings in the form of unwanted or potentially malicious posts. This post will help you identify the type...

Latest IT Security News and Updates from this Week

 August 30, 2013

Estimated reading time: 2 minutes

The Largest Cyber-Attack hits China On 25th August China suffered the largest cyber-attack ever. The news was posted on the website of the China Internet Network Information Center (CNNIC). Reportedly, the attack begun at 2 pm local time paralyzing many websites in the country, before it got worse by 4...

4 Ridiculously Easy Steps to Keep your Android Safe – Infographic

 August 28, 2013

Estimated reading time: 1 minute

Guess what threats your precious Android is exposed to? Crooks, who want to steal it, and miscreants who want to know what stuff is in it? Wait, are we missing something here? Of course, malware attack – the biggest threat of all. Apparently, in 2012, Android turned out to be...

Safety Tips for Using USB Drives

 August 26, 2013

Estimated reading time: 3 minutes

When mankind was struggling with compact disks and floppy disks, the USB drive came into the digital world as a long sought relief. It made storing and transferring of data way easier. But as useful as these tiny gizmos are, they can also be a potential carrier of malware, and...

Latest Security News and Updates from this Week

 August 23, 2013

Estimated reading time: 2 minutes

We are all Transparent Now! If you are on Tumblr, then very soon you might be able to follow the official Tumblr blog of the US National Security Agency (NSA). President Barack Obama expressed that this platform would shake off the iron curtain between the US intelligence community and the...

Best Practices for Enterprise IT Security

 August 21, 2013

Estimated reading time: 3 minutes

To boost brand image and increase productivity, more and more enterprise sectors are exploiting avenues such as cloud technology, social media platforms, and bring your own device (BYOD) to name a few. And when such is the scenario, ignoring the importance of IT security can spell disaster. Here, we have...