Blog

Cyber safety

Do antivirus software impact gaming performance?

 August 4, 2020

Estimated reading time: 2 minutes

Are you an avid gamer? Even if you are not one, you will agree to the common notion that antivirus software affects the performance of computer games. It is a known fact now that gamers share a complicated relationship with anti-virus software. Most gamers try to stay clear of antivirus...

Why is smartphone security so important?

 July 28, 2020

Estimated reading time: 3 minutes

Let’s pause for a second here and think about the astonishingly smart palm-sized device – that is our phone. A decade or two ago it would have been impossible to imagine all the things that a modern-day smartphone can do. A day without our smartphone is quite unimaginable. From remembering...

Is your router exposed to cyber threats? Here’s how to safeguard it

 July 23, 2020

Estimated reading time: 4 minutes

Given that a large number of people use a router to connect to the web, chances are that maybe you using a router at home to access the Internet. While you must be aware of a host of cybersecurity threats that you are exposed to while you browse the Internet,...

Data Breach – Understanding the severity of it

 July 15, 2020

Estimated reading time: 2 minutes

A data breach is a security gap in which information or data is accessed or stolen without authorization. It is a breach of trust between the owner of the data and the party that accesses it without consent. To put it in simpler terms it a nonconsensual usage of someone’s...

New malware via gaming portals may affect thousands of personal computers

 July 2, 2020

Estimated reading time: 2 minutes

Gamers beware. A report by Chinese cybersecurity researchers recently discovered a malicious botnet campaign that infected hundreds of thousands of systems. This botnet campaign was spread through malware via pirate gaming portals. The attack has been traced back to a China-based cybercrime group called DoubleGun which has amassed thousands of...

70% apps in common use have security flaws. Are you protected?

 June 29, 2020

Estimated reading time: 2 minutes

Most of the popular applications we use today are built upon open-source libraries – free code repositories that help developers to create readymade applications. But, how safe are those libraries? According to a recent report, not very. Almost 70 percent of apps in common use were found to have flaws...

BHIM App attacked! Secure your online banking today with Quick Heal

 June 25, 2020

Estimated reading time: 2 minutes

India’s BHIM (Bharat Interface for Money) app used for mobile payments was reported recently to have suffered a massive data leakage of 7.26 million records, according to a security research company. According to the report, the leak happened due to a flaw in a website linked to the BHIM app...

Poulight- An info-stealing trojan might be teaching you how to play Minecraft

 June 22, 2020

Estimated reading time: 7 minutes

Poulight is an info-stealer trojan which most probably originated in Russia. It is written in the .NET and can collect sensitive information and deliver it to cybercriminals. Ever since its first appearance, it has been growing substantially and taking different forms. The main Infection vector remains spear-phishing emails. It was...

Maze ransomware continues to be a threat to the consumers

 June 18, 2020

Estimated reading time: 6 minutes

Maze is a recently highlighted ransomware among the ever-growing list of ransomware families. The ransomware is active from the past one year, although it came into limelight due to its new approach of publishing sensitive data of infected customers publicly. The malware uses different techniques to gain entry like the...