Hacker

Watering Hole Attack – An Overview

Guess what would be a better way for a predator to stalk its prey, rather than chasing it?…

Exponential Rise in Mobile Internet Beckons Better Mobile Security

If we are to believe what tech pundits have to say, mobile devices are going to rule the…

Know the Risks of Using ATM and Online Banking

As convenient and user-friendly as the ATM (automated teller machine) and online banking services are, they have their…

Work from Home Scam

Yet another kind of social media scam that has come under the radar of security officials is the…

How Much Should You Reveal on Facebook?

Oh my God, you do not have a Facebook account? What kind of medieval world do you live…

How do Cyber Criminals get away with Social Engineering Tricks – Infographic

In an earlier post, we had discussed various tricks that cyber criminals use to get what they want….

Classic lies you should not let a cyber criminal use on you

Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out…

How safe are these apps for your kids?

Does your child have access to a Smartphone? Then it’s about time you know about certain apps that…

Caution – Apple Anniversary Awards Scam

Recently I came across an email which pretends to be from Apple corporate office. The email reads, that…

Future Watch VII: War-texting threatens the future of Internet of things

At Quick Heal, we persistently look out for potential security threats that can lead to data breaches in…