Instagram: What you need to know

In an earlier post we talked about various apps and the risks associated with them. In these subsequent posts, we will scratch the surface a little bit and dig a little deeper to understand the privacy implications of one app in particular – Instagram. Now, that our very own Big B, Mr. Amitabh Bachhan is […]

Latest security news updates from the week gone by

Personal information of app users leaked on Google Play People who still disregard Android security and do not take privacy controls over the platform seriously, will be alarmed to learn this piece of news. An Australian app developer recently discovered that he had complete access to personal information of the users who downloaded his application. […]

Why USB drives and CDs are a security risk to your corporate network

It is common knowledge that business organizations need to make significant investments to safeguard their data. This involves protecting the corporate network from external threats and internal parties (employees) as well. This is where effective Endpoint Security (EPS) comes into the picture. EPS is a network security concept that places the responsibility of each device’s […]

Future Watch VII: War-texting threatens the future of Internet of things

At Quick Heal, we persistently look out for potential security threats that can lead to data breaches in the future. The rise of the ‘Internet of Things’ and omnipresent wireless connectivity for miscellaneous items is slowly opening up new attack avenues for hackers. A new kind of hacking attack has come to the forefront recently […]

Latest Mac malware on the rise, hides in networked printer directory

A new variant of Mac malware has been discovered and it is beginning to spread to Apple Macs through the networked printer file directory. The malware is a kind of ‘Backdoor Trojan’ and some sources have named this Trojan ‘Pintsized’. Apple Mac OS X is afflicted by this malware but as of now, the extent […]

Web security basics: Watering hole attacks VS phishing attacks

Computer users who are well versed with security threats know why and how clever phishing pages must be avoided. Clear signs help to identify fake phishing pages but what does one do against a “watering hole attack”? What exactly is a watering hole attack? A watering hole attack is a technique whereby users are profiled […]

Security news and updates from the last week

India – Where most of the world’s spam originates from A large amount of email spam originates in India. This interesting report shows that most of the world’s spam actually originates in India. Facebook has more than 50 million duplicate user accounts worldwide Facebook officials have claimed that there are currently 50 million duplicate accounts […]

Malware Alert! The risk of image searches on Google and Bing

When was the last time you carried out an image search on Google Images? Did you check the website the image was hosted on before you downloaded it on your computer or smartphone? Unknown to you, image searches are one of the biggest channels of malware over the Internet. Security conscious Internet users regularly take […]

Quick Heal proudly launches Total Security for Mac for Apple users

Quick Heal is proud to announce its latest security solution – Quick Heal Total Security for Mac. Designed for the world’s most advanced operating system, Apple Mac OS X, Quick Heal Total Security for Mac is an intelligent security solution that provides advanced protection features without slowing down the performance of an Apple Mac. Considered […]

More than Rs. 30 crore skimmed off Indian credit card users over 2 months

Over the last few days it has come to light that a global syndicate has been skimming Indian credit card users for the last 2 months. Several cases have been reported where people’s credit card bills and registered mobile numbers have shown fraudulent and unauthorized transactions. It is believed that the total unauthorized transactions so […]