A few salient features every Quick Heal user should know

Users of Quick Heal security products and readers of this blog are well aware of the exclusive features…

How to tell the difference between White-Hat, Grey-Hat and Black-Hat hackers

In the last post on hacktivism, we briefly mentioned three different types of hackers – white-hat hackers, grey-hat…

Future Watch I: The impending dangers of Hacktivism and political hacking

Hacktivism is a rising threat to cyber security that we are sure to see more of in the…

Facebook planning to allow under-13s: Is this a good decision?

Simon Milner, Head of Policy in Facebook, Britain, recently declared that Facebook is planning to abolish the act…

Infographic: Quick Heal’s DNAScan Technology

As the proliferation of the Internet and the use and abuse of Web 2.0 increases, computer users are…

Thinking of rooting your precious Droid? Here’s why it may not be such a good idea

The massive popularity of Android smartphones has brought several features and options of the OS to the public…

Infographic: The myth about smartphone invulnerability

Contrary to popular belief, the user-programmable miniature yet powerful mobile devices used for carrying data, sending e-mails, social…

A few tricks to avoid the ‘Phishing’ trap

Phishing is a technique that scammers use to obtain personal information by posing to be from a legitimate…

Massive Smartphone sales reveal growing security concerns

According to recent Gartner and IDC reports, the total sales of smartphones in 2011 went as high as…

Has your Facebook account been hacked? Here’s what to do

We hear about Facebook accounts getting hacked on a daily basis. With hackers dedicated to pounce on the…