Blog

Privacy

Dear Women, Define your Online Identity Securely

  • 36
    Shares
 March 10, 2017

Estimated reading time: 2 minutes

Amazing women are everywhere. They have defined our past and are making our present better so that we can look forward to a better future. Women have always been more vocal, expressive and willing to share than men. And social networking has become one the most powerful platforms for them...

The Top 10 Cybersecurity Stories of 2016

  • 53
    Shares
 December 31, 2016
top_10_cybersecurity_stories_from_2016

Estimated reading time: 3 minutes

Before we take yet another step into the New Year, let’s quickly look back at the top 10 cybersecurity stories of 2016. 1. Do not take that IQ Test on Facebook. It’s a Scam! In Jan 2016, a scam was afoot on Facebook. This scam was tricking users into taking...

11 Tips for Secure Cashless Transactions

  • 789
    Shares
 December 22, 2016
11_tips_to_do_secure_cashless_transactions

Estimated reading time: 2 minutes

In the wake of the demonetisation campaign, people are opting for cashless transactions for online banking, shopping, paying bills, booking tickets, etc. But, while this mode of payment may have brought some relief to the cash crunch in ATMs and banks, it has opened up new opportunities for cybercriminals. And...

Security Alert! Stay Away from Pirated Software

  • 70
    Shares
 November 7, 2016

Estimated reading time: 2 minutes

Pirated, cracked, unauthorized or unlicensed software may be dirt cheap or come for free, but they may cost you your digital security. With unknown publishers and no standard testing procedures in place, such software contain several security flaws which can be used by hackers to gain access to your computer....

5 Things that Show you’re Sharing too Much Information Online

  • 339
    Shares
 September 21, 2016

Estimated reading time: 4 minutes

It’s easier for predatory animals (lions, wolves, bears, hawks, etc.) to hunt their preys on open grounds with fewer or no places to hide. And this scenario is no different for us when we are online. The moment we get on the Internet, we place ourselves on a hunting patch...

WhatsApp to share your phone number with Facebook. Here’s how you can prevent this

  • 2
    Shares
 August 26, 2016

Estimated reading time: 4 minutes

The privacy policy of WhatsApp has undergone some change as of 25th August 2016. And here are 10 things that you must know. 1. WhatsApp has announced that it will start sharing your phone number with its parent company Facebook (Facebook acquired WhatsApp back in February 2014). This news comes...

Third-Party Apps becomes significant source of Malware Attacks on Android Smartphones

  • 65
    Shares
 July 22, 2016

Estimated reading time: 3 minutes

We love options! But smart people also love the authenticity of the options available. Most of us rely on Google Play Store or Windows Store to download our favorite apps because they are the official pre-installed app for Android and Windows devices and hence, a trusted source. Google Play or...

Check if your Online Account has been Leaked in a Data Breach

  • 13
    Shares
 July 8, 2016

Estimated reading time: 2 minutes

A data breach is defined as an incident where private and confidential information is illegally viewed, used or accessed by a malicious entity. In May 2016, passwords of over 100 million LinkedIn users were stolen by hackers in a major data breach. Similar incidents of data breach have occurred in...

Infostealer Campaign detected in the wild

  • 1
    Share
 May 30, 2016

Estimated reading time: 2 minutes

Quick Heal Threat Research Lab has recently observed an active cybercrime campaign designed to steal user info. The campaign has been noticed to make use of three keyloggers (malicious software that records information entered by a user on their computer keyboard) iSpy logger, Predator logger and Knight Logger. These software...