Privacy

Check if your Online Account has been Leaked in a Data Breach

A data breach is defined as an incident where private and confidential information is illegally viewed, used or…

Infostealer Campaign detected in the wild

Quick Heal Threat Research Lab has recently observed an active cybercrime campaign designed to steal user info. The…

Stay away from ‘WhatsApp Gold’ – It’s a fake app!

If you haven’t yet heard of the ‘WhatsApp Gold’ app, you soon will. And we are here to…

Report: The Dridex Trojan is Back

“Dridex”, also known as ‘Buget’, is the successor of “Cridex”, a banking Trojan created for stealing victim credentials….

INFOGRAPHIC: What is Phishing?

If truth be told, phishing has been one of the oldest and most effective tools for cyber criminals….

How to Identify Fake Apps in the Google Play Store

What is the first thing we do whenever we get our hands on a shiny new phone? No…

5 Best Instagram Security Tips

When Instagram was formed as an iOS-only photo sharing app in 2010, nobody imagined how big and popular…

Be Careful of these Potential Online Scams

With services like WhatsApp and other such messaging platforms, communication has become easier and highly convenient. But, as…

Boarding Passes Pose Serious Security Risks for Frequent Fliers

When was the last time you took a flight to someplace and back and then carelessly threw your…

Security Habit to Make: Strong Passwords for Stronger Security

In continuation to the first part of Security Habits to Break and Make in 2016, this one is…