Blog

Applications

All you need to know about API Security

Estimated reading time: 4 minutes

An Application Programming Interface (API) is a way that allows applications to communicate with one another. It provides a way for developers to build software applications while enabling the extraction and sharing of data in an accessible manner. APIs can be used to facilitate cyberattacks as APIs are widely used...

70% apps in common use have security flaws. Are you protected?

Estimated reading time: 2 minutes

Most of the popular applications we use today are built upon open-source libraries – free code repositories that help developers to create readymade applications. But, how safe are those libraries? According to a recent report, not very. Almost 70 percent of apps in common use were found to have flaws...

Ransomware As A Tool – LockerGoga

 July 3, 2019

Estimated reading time: 5 minutes

Ransomware authors keep experimenting with the development of payload in various dimensions. In the timeline of ransomware implementations, we have seen its evolution from a simple screen locker to multi-component model for file encryption, from novice approach to a sophisticated one. The Ransomware as a Tool has evolved in wild...

3059 android malware detected per day in 2018 – Are you still counting on free android antivirus for protection?

 March 22, 2019

Estimated reading time: 2 minutes

The incidents of cyber-attacks on smartphones, especially those working on the popular Android operating system, have been on a constant rise. However, a major reason people still continue to go in for android smartphones, is the fact that these are mostly cheap to buy. However, the year 2018 ended with...

A massive security flaw discovered in Skype. Fix not coming anytime soon.

  • 18
    Shares
 February 14, 2018

Estimated reading time: 2 minutes

Quick Heal Security Labs has recently learned about a serious vulnerability in Skype’s update installer – that’s the bad news. The worse news is, Microsoft is not going to patch the vulnerability anytime soon as this would require the updater to go through a ‘large code revision’. What is this...

5 things you must know about the Uber data breach if you are worried about it

  • 1
    Share
 November 23, 2017
Uber_data_breach

Estimated reading time: 3 minutes

For any business, suffering a data breach is bad. But, not informing its customers about the breach is downright worse. And Uber, a global transportation app company, has made itself into a glaring example of the above statement. Last Tuesday (21.11.2017), Uber Technologies revealed that hackers were able to compromise...

Dear Women, Define your Online Identity Securely

  • 36
    Shares
 March 10, 2017

Estimated reading time: 2 minutes

Amazing women are everywhere. They have defined our past and are making our present better so that we can look forward to a better future. Women have always been more vocal, expressive and willing to share than men. And social networking has become one the most powerful platforms for them...