Caution! Beware of the Fake WhatsApp Mother’s Day Scam.

Getting text messages from random numbers is disturbing. But spam messages aren’t just annoying; they can also be…

Introduction of DNS tunneling and how attackers use it.

  What is DNS?  DNS (Domain Name System) is a service that converts hostnames to IP addresses. It…

Worried about your mobile security? Here’s how to secure your device and enhance performance

While the world is still adapting to the new normal and mobile devices replace PCs as the primary…

Stay Alert of Facebook Credential Stealer Applications Stealing User’s Credentials.

Social media credentials are always a lucrative thing for threat actors. They use various techniques to get them….

CVE-2021-44228: New Apache Log4j ‘Log4Shell’ Zero-Day Being Exploited in the Wild

A critical zero-day vulnerability (CVE-2021-44228) recently discovered Apache Log4J, the popular java open source logging library used in…

Quick Heal Supports Windows 10 November 2021 Update (version 21H2)

Microsoft has recently developed a new update for Windows 10 PCs, called Windows 10 November 2021 update, version…

Multi-Staged JSOutProx RAT Targets Indian Co-operative Banks and Finance Companies

  Quick Heal Security Labs has been monitoring various attack campaigns using JSOutProx RAT against different SMBs in…

Update – Quick Heal products are compatible with Windows 11

Microsoft has released an all-new Windows 11 Operating System (OS). This article highlights the new features in Windows…

How Unlimited Internet Data Has Changed The Face Of Cybercrime?

VoLTE: Voice over LTE is a high-speed wireless communication standard for mobile phones. It has up to three…

Blockchain & Fraud Prevention: Strategies to overcome the cryptocurrency scam

What is Cryptocurrency?  Cryptocurrency is a type of digital currency that generally only exists electronically. There is no…