Quick Heal Security Lab has seen a sudden increase in dotnet samples which are using steganography. Initially, in…
Quick Heal Security Lab has seen a sudden increase in dotnet samples which are using steganography. Initially, in…
What is SHA-1 and SHA-2, and deprecation of SHA-1? SHA-1 & SHA-2 are algorithms a certificate uses…
Here’s a hypothetical scenario. You consider yourself a model user in all matters of cybersecurity. You have an…
Phew, an unprecedented year finally seems to be coming to an end. To put it mildly, it’s been…
Microsoft has recently come up with a new update for Windows 10 PCs – Windows 10 October 2020…
We often hear of security experts speak about the benefits of using VPN services when using the Internet….
It might be difficult to find a software engineer who does not know ‘Make’ utility. ‘GNU Make’ is…
Unless you’re a hermit who lives under a rock, you probably use social media in some form or…
A threat actor named Emotet Trojan has been in the wild for more than 5 years, and now…
Social media is a fraudster’s heaven. There are billions of targets – Facebook itself had over 2.6 billion…