Why is smartphone security so important?

Let’s pause for a second here and think about the astonishingly smart palm-sized device – that is our…

Why is smartphone security so important?

Is your router exposed to cyber threats? Here’s how to safeguard it

Given that a large number of people use a router to connect to the web, chances are that…

Are you being tracked by websites you visit?

You’re bored during the lockdown. To pass the time, you create an imaginary itinerary to Italy. After a…

Data Breach – Understanding the severity of it

A data breach is a security gap in which information or data is accessed or stolen without authorization….

How to make online classes safe for your children from digital threats

Accept it or not we are now living in a “new normal” where the world has changed dramatically….

New malware via gaming portals may affect thousands of personal computers

Gamers beware. A report by Chinese cybersecurity researchers recently discovered a malicious botnet campaign that infected hundreds of…

70% apps in common use have security flaws. Are you protected?

Most of the popular applications we use today are built upon open-source libraries – free code repositories that…

BHIM App attacked! Secure your online banking today with Quick Heal

India’s BHIM (Bharat Interface for Money) app used for mobile payments was reported recently to have suffered a…

Poulight- An info-stealing trojan might be teaching you how to play Minecraft

Poulight is an info-stealer trojan which most probably originated in Russia. It is written in the .NET and…

Maze ransomware continues to be a threat to the consumers

Maze is a recently highlighted ransomware among the ever-growing list of ransomware families. The ransomware is active from…