Blog

Applications

Security Vulnerabilities for Android and iOS Hit An All-time High in 2015

  • 1
    Share
 December 4, 2015

Estimated reading time: 4 minutes

Quick Heal hopes it has been a good year for you. But, has it been a good year for your mobile devices as well? It has been an alarming year for both Android and iOS users. If Android users were vulnerable to Stagefright attacks, iOS users had their own share...

4 dangerous apps for teens that parents should know about

 June 9, 2014

Estimated reading time: 4 minutes

When it comes to safeguarding kids and teenagers online, many parents are already pretty clued up. They stay aware about the latest online apps that are in vogue and their risks, and many of them also get actively involved with their child’s online activities. Some parents also friend their kids...

Lost your Laptop? Let Quick Heal Track it for you!

 July 19, 2013

Estimated reading time: 1 minute

What are the odds of getting back a lost or a stolen laptop? Sure, there are many types of laptop tracking software available on the market, yet, reportedly, 46% of lost laptops have no anti-theft protection. Why so? Well, this could be because: Most might think that such software is...

Whatsapp Hoax (fake) Messages Doing the Rounds Again

  • 1
    Share
 June 25, 2013

Estimated reading time: 3 minutes

Today one of my colleagues received a message on WhatsApp that read: “Hello, I. Am riya director of whatsapp, this message is to inform all of our users that we have only 530 accounts available for new phones, and that our servers have recently been very congested, so we asking...

Apps that every parent should know about

  • 1
    Share
 June 11, 2013

Estimated reading time: 3 minutes

Beginning of the school year is a delicate time for children and youth. If academic expectations are not enough, children seem to believe that they are expected to live up to peer-pressure as well. This is always accompanied by insecurities and complexes. There are helplines, guides and mentors that exist...

Exponential Rise in Mobile Internet Beckons Better Mobile Security

 June 5, 2013

Estimated reading time: 2 minutes

If we are to believe what tech pundits have to say, mobile devices are going to rule the roost when it comes to Internet usage, in the coming years. Reportedly, mobile data traffic in 2012 has been recorded to be 12 times higher than global Internet traffic in 2000. Globally,...

Classic lies you should not let a cyber criminal use on you

  • 1
    Share
 April 15, 2013

Estimated reading time: 2 minutes

Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out certain actions or giving away confidential information is known as Social Engineering. And this is a rampant form of exploitation. Why? If you can get access to anything you want just by...

Adobe addresses serious vulnerabilities with its latest patches

 April 10, 2013

Estimated reading time: 1 minute

Adobe Systems has released improved versions of Flash Player, Shockwave Player and ColdFusion to patch critical vulnerabilities in these. As stated by Adobe “these vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system” The new versions of Flash Player for Windows and...

Instagram: What you need to know – Part 2

 April 6, 2013

Estimated reading time: 4 minutes

This post is in continuation with our previous post on Instagram and will discuss how you can control your privacy in the app. In Instagram the key word is ‘public.’ Once an Instagram profile has been created, anyone can browse these online profiles and “follow” other Instagram users. Here comes the...