Are you being tracked by websites you visit?

You’re bored during the lockdown. To pass the time, you create an imaginary itinerary to Italy. After a…

Data Breach – Understanding the severity of it

A data breach is a security gap in which information or data is accessed or stolen without authorization….

How to make online classes safe for your children from digital threats

Accept it or not we are now living in a “new normal” where the world has changed dramatically….

New malware via gaming portals may affect thousands of personal computers

Gamers beware. A report by Chinese cybersecurity researchers recently discovered a malicious botnet campaign that infected hundreds of…

70% apps in common use have security flaws. Are you protected?

Most of the popular applications we use today are built upon open-source libraries – free code repositories that…

BHIM App attacked! Secure your online banking today with Quick Heal

India’s BHIM (Bharat Interface for Money) app used for mobile payments was reported recently to have suffered a…

Poulight- An info-stealing trojan might be teaching you how to play Minecraft

Poulight is an info-stealer trojan which most probably originated in Russia. It is written in the .NET and…

Maze ransomware continues to be a threat to the consumers

Maze is a recently highlighted ransomware among the ever-growing list of ransomware families. The ransomware is active from…

Malicious bots targeting e-commerce and travel websites – A perceivable threat

Malicious bots are becoming a major threat on the Internet. A recent survey suggested that attacks on applications,…

Maze of Maze ransomware & its deceitful tactics

Maze is a recent highlighted ransomware among the ever-growing list of ransomware families. Maze ransomware is active from…