June 2015

Why are Software Updates so Important for your Security


Estimated reading time: 3 minutes

Attention readers! – Do you use Adobe Flash in your Internet browser? If yes, then make certain that you have got the latest update from Adobe to prevent any possible Ransomware attacks on your system. The update was released on June 23rd. If you want to read more on this,...

Gmail’s ‘Undo Send’, Facebook ‘New Face Recognition’ and more news


Estimated reading time: 2 minutes

Here are this week’s top stories, news and updates from the world of computer security. Cover your face as much as you want to. Facebook can still identify you Facebook is experimenting with a new technology that can enable people to identify you in photos even if your face is...

How Vulnerable is your Small and Medium-sized Business? [UPDATED]


Estimated reading time: 4 minutes

Are you aware that the best targets for hackers and malware authors around the world are small and medium sized businesses? The reasons for this are aplenty, but the most crucial cause of this is that smaller businesses have multiple points of vulnerability. Moreover, the security practices that they adopt...

Using Quikr or OLX? Protect your Privacy on WhatsApp


Estimated reading time: 2 minutes

If you have been getting unwanted calls or messages on WhatsApp, then it might be because of your Quikr or OLX account. Know why from this post.   When you put up something for sale on Quikr or OLX, you have to share your number mandatorily, so that prospective buyers...

Quick Heal v16.00 (2015) and above will support Windows 10


Estimated reading time: 2 minutes

The latest spur that has been created on the Internet is by none other than Microsoft. Windows 10 for free? Well, why not! Most users who have Windows 7 or Windows 8.1 on their PC have received a notification on their taskbar asking them to reserve their free upgrade to...

Stegosploit – A Technique that can Hack your PC Using Just an Image!

  • 2

Estimated reading time: 2 minutes

By merely looking at an image in your browser, you can infect your PC with a malware. Know how from the following post. Thanks to a technique called Stegosploit, a hacker can infect your system by simply making you load an image on the Internet. You don’t even have to...