What is Phishing? A Deep Dive into the Phishing Attack Mechanisms with Tips

Phishing is a technique used to steal credentials, personal information & financial details of a user. The attacker…

RockYou2021: Massive data leak of passwords on the dark web

  The issue of a data breach continues to plague the world of cybersecurity. What seems to be the most…

CVE-2017-5638 – Apache Struts 2 Remote Code Execution Vulnerability

The well-known open source web application framework Apache Struts 2 is being actively exploited in the wild allowing…

Security Vulnerabilities for Android and iOS Hit An All-time High in 2015

Quick Heal hopes it has been a good year for you. But, has it been a good year…

The 6 Biggest Data Breaches of 2015 So Far

For those of you who are following the news about the leakage of Ashley Madison’s (an American adult…

Stegosploit – A Technique that can Hack your PC Using Just an Image!

By merely looking at an image in your browser, you can infect your PC with a malware. Know…

Apple security in the spotlight and other IT Security news

Apple enjoyed a fine week with the reveal of iOS8 and the new iPhone 6, but in spite…

Facebook scam, Snowden interview and other IT security news

A new Facebook scam has been found doing the rounds recently, and it is something we here at…

eBay faces a major hack and other security news

In massive security news this last week, eBay was hacked on a large scale. This is the dominant…

Alert for users of Instagram, Bitly and Android and other security news

There is no such thing as a slow news day, as every week is filled with stories of…