Beware of the Apple ID Suspension Phishing Scam!

A phishing scam is doing the rounds on the Internet, and is targeted towards users with Apple ID…

4 Simple Tricks to Spot Fake LinkedIn Profiles

Do you use LinkedIn to connect with your professional contacts and to interact or look around for potential…

LinkedIn security tips

The Curious Case of Upatre

What is Upatre? Upatre is a piece of malicious software that downloads and executes other malware. The name…

Older Versions of Quick Heal Android Apps will no Longer be Supported

This post is intended to inform our users that we are soon ending our support for Quick Heal…

Global Crackdown on 37,000 Fake Shopping Sites

Ecommerce websites are all the rage around the world today, and millions of goods exchange hands over the…

Fake shopping sites

Security Vulnerabilities for Android and iOS Hit An All-time High in 2015

Quick Heal hopes it has been a good year for you. But, has it been a good year…

Superfish 2.0 – Dell Laptops Preinstalled with Similar Malware and Security Flaw

Earlier this year, several cases came to light where brand new Lenovo laptops came preinstalled with a strain…

Superfish 2.0 on Dell

Ransomware could be the Biggest Security Threat in 2016

While the list of security threat predictions for 2016 is long, the one that concerns home users the…

Using Google Chrome on these Operating Systems Will be Risky

Google Chrome is one of the best web browsers around, and this is highlighted by its growing usage…

Security Hole in Gmail Android App Makes Phishing Attacks Easier

A recently discovered bug in the Gmail Android App allows anyone to pose as someone else, hiding their real…