Blog

Social engineering

4 Simple Tricks to Spot Fake LinkedIn Profiles

 December 11, 2015
LinkedIn security tips

Estimated reading time: 3 minutes

Do you use LinkedIn to connect with your professional contacts and to interact or look around for potential employment opportunities? If yes, then you must have surely received LinkedIn connection requests from some people unknown to you at some point in time. Most people assume that LinkedIn is a reliable...

Be Careful of these 5 Internet Scams Running on Facebook

  • 9
    Shares
 September 4, 2015

Estimated reading time: 4 minutes

As of last quarter, Facebook has over 1.19 billion monthly active users, with 728 million users using the service daily. On the dark side of the world, this figure amounts to the number of victims that online scammers have charted on their dartboards. Unarguably, Facebook is the most lucrative avenue...

How Security Savvy are Your Staff?

 March 6, 2014

Estimated reading time: 3 minutes

Modern business enterprises deal with large stacks of crucial data that need to be processed at high speeds. As a result, security is often a blind spot for them. Basic enterprise security tips are overlooked for the sake of convenience and this eventually leads to security breaches or data loss....

Classic lies you should not let a cyber criminal use on you

  • 1
    Share
 April 15, 2013

Estimated reading time: 2 minutes

Cyber criminals can devise various ways to get what they want from you. Manipulating people into carrying out certain actions or giving away confidential information is known as Social Engineering. And this is a rampant form of exploitation. Why? If you can get access to anything you want just by...

More than Rs. 30 crore skimmed off Indian credit card users over 2 months

 February 7, 2013

Estimated reading time: 2 minutes

Over the last few days it has come to light that a global syndicate has been skimming Indian credit card users for the last 2 months. Several cases have been reported where people’s credit card bills and registered mobile numbers have shown fraudulent and unauthorized transactions. It is believed that...

Facebook Graph Search: Useful search engine or phishers dream come true?

 January 29, 2013

Estimated reading time: 3 minutes

Facebook recently launched a notable new feature known as Graph Search. Mark Zuckerberg highlighted this feature as one of the 3 pillars of Facebook (after Newsfeed and Timeline) that make the social network relevant and personalized. But how safe is Graph Search? We feel that there are several security and...

Your Apple Mac does not need computer security: Myth or not?

 January 23, 2013

Estimated reading time: 3 minutes

There is a widespread misconception in the mainstream computing market that Apple Macs are more secure than Windows machines. In fact, some staunch Apple lovers even feel that since virus threats for Macs do not exist, no system protection software is essential. But how accurate is this belief? Our expertise...

Microsoft releases a Fix it solution to prevent Internet Explorer hijacking vulnerability

 January 3, 2013

Estimated reading time: 2 minutes

Microsoft has successfully released a ‘Fix it solution’ for the recently discovered targeted attack, CVE-2012-4792. This attack was specifically targeted at users of Internet Explorer versions 6, 7 and 8. Users of Internet Explorer 9 and 10 were not affected. The attack exploited a vulnerability that allowed an attacker to...

Top 10 Quick Heal security blogs for 2012

 December 27, 2012

Estimated reading time: 2 minutes

2012 has been an eventful year for malware and security threats. A number of innovative social engineering tricks, malwares and threats reared their ugly heads and caused losses all around the world. We witnessed all kinds of attacks by hackers and posted a number of findings on our blog. Here...