# Tags

Facebook Graph Search could interfere with your online privacy

Three months ago Facebook revealed Graph Search which had a lot of mixed reviews. While some reviewers considered it to be a great marketing tool for direct messages, others expressed that it could bring huge security concerns with it. What is Graph Search? Touted to be the ultimate search tool that collates quality information from […]

Caution – Apple Anniversary Awards Scam

Recently I came across an email which pretends to be from Apple corporate office. The email reads, that the company is conducting an Apple ongoing Anniversary award ceremony and that the reader is the lucky winner to have won the award of Five Hundred Thousand Great British Pounds (500,000.00) through a computer ballot. It further […]

How to avoid accidental in-app purchases by kids on your Smartphone?

Uncontrolled in-app purchases can result in huge bills for your Smartphone. However, the feature can be easily turned off. Needless to say, ‘free’ apps in Google Play or iTunes Store are always more preferable than their ‘paid’ counterparts. However, these apps work using a ‘freemium’ model to generate revenue. Yes, you read it right; nothing […]

Latest security news updates from the week gone by

Personal information of app users leaked on Google Play People who still disregard Android security and do not take privacy controls over the platform seriously, will be alarmed to learn this piece of news. An Australian app developer recently discovered that he had complete access to personal information of the users who downloaded his application. […]

Why USB drives and CDs are a security risk to your corporate network

It is common knowledge that business organizations need to make significant investments to safeguard their data. This involves protecting the corporate network from external threats and internal parties (employees) as well. This is where effective Endpoint Security (EPS) comes into the picture. EPS is a network security concept that places the responsibility of each device’s […]

Future Watch VII: War-texting threatens the future of Internet of things

At Quick Heal, we persistently look out for potential security threats that can lead to data breaches in the future. The rise of the ‘Internet of Things’ and omnipresent wireless connectivity for miscellaneous items is slowly opening up new attack avenues for hackers. A new kind of hacking attack has come to the forefront recently […]

Latest Mac malware on the rise, hides in networked printer directory

A new variant of Mac malware has been discovered and it is beginning to spread to Apple Macs through the networked printer file directory. The malware is a kind of ‘Backdoor Trojan’ and some sources have named this Trojan ‘Pintsized’. Apple Mac OS X is afflicted by this malware but as of now, the extent […]

Web security basics: Watering hole attacks VS phishing attacks

Computer users who are well versed with security threats know why and how clever phishing pages must be avoided. Clear signs help to identify fake phishing pages but what does one do against a “watering hole attack”? What exactly is a watering hole attack? A watering hole attack is a technique whereby users are profiled […]

Security news and updates from the last week

India – Where most of the world’s spam originates from A large amount of email spam originates in India. This interesting report shows that most of the world’s spam actually originates in India. Facebook has more than 50 million duplicate user accounts worldwide Facebook officials have claimed that there are currently 50 million duplicate accounts […]