Blog

Tips

Thinking of buying an Anti-spam product? Here’s a checklist

 July 3, 2012

Estimated reading time: 2 minutes

When your organization decides to shell out money on an anti-spam product for network security, there are a few important things that should be considered. Choosing an anti-spam product that provides you the right kind of protection, is cost-effective and doesn’t eat up system resources falls on the high-priority list....

A few salient features every Quick Heal user should know

 June 1, 2012

Estimated reading time: 2 minutes

Users of Quick Heal security products and readers of this blog are well aware of the exclusive features we offer our valued customers. We would like to highlight some ownership benefits that are unique to Quick Heal and prove how much we cherish our users. Here are some advantages of...

Thinking of rooting your precious Droid? Here’s why it may not be such a good idea

 May 19, 2012

Estimated reading time: 3 minutes

The massive popularity of Android smartphones has brought several features and options of the OS to the public domain. One of these options remains the ability to ‘root’ the device. Rooting an Android phone implies gaining (superuser) access to the kernel code of the software and using this access to...

A few tricks to avoid the ‘Phishing’ trap

 May 11, 2012

Estimated reading time: 3 minutes

Phishing is a technique that scammers use to obtain personal information by posing to be from a legitimate source. As a result, there are many people who fall for phishing emails. We regularly update this blog with details about fraudulent emails that attempt to phish for information, but now we...

When Facebook Apps cease to be ‘Cool’

 May 7, 2012

Estimated reading time: 3 minutes

Have you ever wondered why certain ads show up in the right hand corner of your Facebook page? A closer look at these ads and you will be surprised at the volumes they speak about your lifestyle choices – be it exclusive shoes from an e-retailer or a self-development course!...

Has your Facebook account been hacked? Here’s what to do

  • 1
    Share
 April 24, 2012

Estimated reading time: 4 minutes

We hear about Facebook accounts getting hacked on a daily basis. With hackers dedicated to pounce on the slightest mistake made by a user, cases of Facebook accounts being compromised have become quite unavoidable. There are also instances of a friend or family member getting unauthorized access and misusing the...

How to Avoid Facebook Scams

  • 3
    Shares
 April 12, 2012

Estimated reading time: 8 minutes

With more than 800 million users all over the world, Facebook is the perfect breeding ground for scam artists. Every Facebook user has their account interlinked with hundreds or even thousands of their friends. With the exponential amount of users connected to each other Facebook scams require only a few...

Indian Cyberspace hit by Kim Jong-II Malware Mails!

 January 3, 2012

Estimated reading time: 1 minute

It has been observed that cybercriminals are using the name of the North Korean leader Kim Jong-II after his death to target Internet users. Attackers are achieving this by spamming malicious emails containing specially crafted PDF files named “BriefintroductionofKim-Jong-il.pdf” This PDF file has been found to exploit CVE-2010-2883 and CVE-2010-3333...

Security Advisory for Adobe Reader and Acrobat!

 December 18, 2011

Estimated reading time: 1 minute

A critical vulnerability has been identified in Adobe Reader X (10.1.1) and earlier versions for Windows and Macintosh, Adobe Reader 9.4.6 and earlier 9.x versions for UNIX and Adobe Acrobat X (10.1.1) and earlier versions for Windows and Macintosh. This vulnerability (CVE-2011-2462) could cause a crash and potentially allow an...

How You Can Protect Your Website!

 December 8, 2011

Estimated reading time: 2 minutes

It is seen that more and more people are creating websites to market their products. This is a wise move since running your own website will certainly help in getting more customers to purchase your products. But unfortunately, in addition to the customers, hackers too are attracted towards such websites....