Blog

Apple

Instagram: What you need to know – Part 2

 April 6, 2013

Estimated reading time: 4 minutes

This post is in continuation with our previous post on Instagram and will discuss how you can control your privacy in the app. In Instagram the key word is ‘public.’ Once an Instagram profile has been created, anyone can browse these online profiles and “follow” other Instagram users. Here comes the...

Instagram: What you need to know

 April 3, 2013

Estimated reading time: 3 minutes

In an earlier post we talked about various apps and the risks associated with them. In these subsequent posts, we will scratch the surface a little bit and dig a little deeper to understand the privacy implications of one app in particular – Instagram. Now, that our very own Big...

Caution – Apple Anniversary Awards Scam

 March 15, 2013

Estimated reading time: 1 minute

Recently I came across an email which pretends to be from Apple corporate office. The email reads, that the company is conducting an Apple ongoing Anniversary award ceremony and that the reader is the lucky winner to have won the award of Five Hundred Thousand Great British Pounds (500,000.00) through...

How to avoid accidental in-app purchases by kids on your Smartphone?

 March 5, 2013

Estimated reading time: 2 minutes

Uncontrolled in-app purchases can result in huge bills for your Smartphone. However, the feature can be easily turned off. Needless to say, ‘free’ apps in Google Play or iTunes Store are always more preferable than their ‘paid’ counterparts. However, these apps work using a ‘freemium’ model to generate revenue. Yes,...

Latest Mac malware on the rise, hides in networked printer directory

 February 20, 2013

Estimated reading time: 2 minutes

A new variant of Mac malware has been discovered and it is beginning to spread to Apple Macs through the networked printer file directory. The malware is a kind of ‘Backdoor Trojan’ and some sources have named this Trojan ‘Pintsized’. Apple Mac OS X is afflicted by this malware but...

Quick Heal proudly launches Total Security for Mac for Apple users

 February 12, 2013

Estimated reading time: 3 minutes

Quick Heal is proud to announce its latest security solution – Quick Heal Total Security for Mac. Designed for the world’s most advanced operating system, Apple Mac OS X, Quick Heal Total Security for Mac is an intelligent security solution that provides advanced protection features without slowing down the performance...

The first computer virus was designed for an Apple computer, by a 15 year old

 February 6, 2013

Estimated reading time: 3 minutes

Contrary to popular belief, the first widespread computer virus that actively spread ‘in-the-wild’ was designed to target Apple computers. This might surprise some staunch Apple users who still feel that their Macs are completely invincible and cannot be infected with any kind of malware whatsoever. In this post we will...

A history of Mac malware: The Apple of a virus developer’s eye

 January 31, 2013

Estimated reading time: 4 minutes

Apple Macs are falsely believed to be invincible and completely safe against malware threats and security breaches. But as we recently discussed, this perpetual myth has gradually been broken over the years. Apple has subtly acknowledged this fact over the last year or so and has made major upheavals in...

Your Apple Mac does not need computer security: Myth or not?

 January 23, 2013

Estimated reading time: 3 minutes

There is a widespread misconception in the mainstream computing market that Apple Macs are more secure than Windows machines. In fact, some staunch Apple lovers even feel that since virus threats for Macs do not exist, no system protection software is essential. But how accurate is this belief? Our expertise...

Security news updates from the last week

 September 21, 2012

Estimated reading time: 1 minute

Microsoft releases ‘Fix it’ tool for IE vulnerability Microsoft has released a temporary “Fix it” tool for the highly publicized Internet Explorer vulnerability. A full IE update will soon be released as well. The security hole exploited Internet Explorer users when they visited a malicious website and installed a trojan...