Blog

Privacy

All you need to know about API Security

Estimated reading time: 4 minutes

An Application Programming Interface (API) is a way that allows applications to communicate with one another. It provides a way for developers to build software applications while enabling the extraction and sharing of data in an accessible manner. APIs can be used to facilitate cyberattacks as APIs are widely used...

Are you being tracked by websites you visit?

 July 17, 2020

Estimated reading time: 2 minutes

You’re bored during the lockdown. To pass the time, you create an imaginary itinerary to Italy. After a couple of hours of merrily choosing the best places in Rome and Milan to see, you turn off the website and go back to your work. But then, you notice something strange....

Data Breach – Understanding the severity of it

 July 15, 2020

Estimated reading time: 2 minutes

A data breach is a security gap in which information or data is accessed or stolen without authorization. It is a breach of trust between the owner of the data and the party that accesses it without consent. To put it in simpler terms it a nonconsensual usage of someone’s...

BHIM App attacked! Secure your online banking today with Quick Heal

 June 25, 2020

Estimated reading time: 2 minutes

India’s BHIM (Bharat Interface for Money) app used for mobile payments was reported recently to have suffered a massive data leakage of 7.26 million records, according to a security research company. According to the report, the leak happened due to a flaw in a website linked to the BHIM app...

Way Out of The MAZE: A Quick Guide For Defending Against Maze Ransomware

 April 23, 2020
The modus operandi of the Maze Ransomware

Estimated reading time: 6 minutes

From late 2019, MAZE Ransomware started becoming infamous for its Encryption, data stealing and the subsequent selling of the stolen data. Few other reasons behind its popularity are also its unique targets and the ransom demands. From its inception around May 2019, MAZE actors are targeting multiple sectors, prominent ones...

HorseDeal Riding on The Curveball!

 February 5, 2020

Estimated reading time: 5 minutes

It’s surprising to see how quickly attackers make use of new vulnerabilities in malware campaigns. Microsoft recently patched a very interesting vulnerability in their monthly Patch Tuesday update for January 2020. It’s a spoofing vulnerability in Windows CryptoAPI (Crypt32.dll) validation mechanism for Elliptic Curve Cryptography (ECC) certificates. An attacker could...

A sloppy click can exfiltrate your important data!

 February 3, 2020

Estimated reading time: 4 minutes

Phishing email still remains one of the top malware propagation medium. Recently, we came across an interesting phishing email containing couple of Jumpshare links pointing to malicious components. Jumpshare is an online file sharing service and often cyber criminals abuse these kind of file sharing services. Upon clicking on one of the links in...

What’s new in macOS Catalina ‘Security and Privacy’?

 November 1, 2019

Estimated reading time: 4 minutes

Apple released macOS 10.15 (Catalina) on 7th Oct 2019 and now it is publicly available for download. With multiple features presented at the WWDC 2019, here’s an overview of the new security and privacy features introduced in Catalina. Enhanced Gatekeeper Gatekeeper, is an important outer layer of security, designed to...

Webcam Hacking – How to prevent webcam from hacking into your privacy?

 July 19, 2019

Estimated reading time: 2 minutes

Imagine a day when you open your inbox and there’s this one mail containing obscene pics of you flashing on the screen. Right below is a message asking you to pay a hefty ransom to prevent your pics from getting shared with all your accounts. The thought itself is enough...