Blog

Security

Quick Heal Supports Windows 10 October 2020 Update

 October 19, 2020

Estimated reading time: 2 minutes

Microsoft has recently come up with a new update for Windows 10 PCs – Windows 10 October 2020 Update (Build version 20H2) Here are some of the highlights of this update and its compatibility with Quick Heal. Few Highlights of Windows 10 October 2020 Update An updated version of the...

Emotet Trojan is back as the world unlocks

 September 26, 2020

Estimated reading time: 5 minutes

A threat actor named Emotet Trojan has been in the wild for more than 5 years, and now it is back after a 5 months break. It has spread globally, infecting new as well as old targets. It is re-launched with multiple Malspam Campaigns to distribute in all sectors. We...

Parental Control – Here’s how you can regulate your child’s computer habits

 August 24, 2020

Estimated reading time: 2 minutes

Today’s generation of children is introduced to technology from the moment they are born. So it’s not a surprise to hear that, according to one study from 2013, children are using the Internet from the age of three! This year especially has seen a mass migration from the physical to...

All you need to know about API Security

 August 19, 2020

Estimated reading time: 4 minutes

An Application Programming Interface (API) is a way that allows applications to communicate with one another. It provides a way for developers to build software applications while enabling the extraction and sharing of data in an accessible manner. APIs can be used to facilitate cyberattacks as APIs are widely used...

Do antivirus software impact gaming performance?

 August 4, 2020

Estimated reading time: 2 minutes

Are you an avid gamer? Even if you are not one, you will agree to the common notion that antivirus software affects the performance of computer games. It is a known fact now that gamers share a complicated relationship with anti-virus software. Most gamers try to stay clear of antivirus...

Are you being tracked by websites you visit?

 July 17, 2020

Estimated reading time: 2 minutes

You’re bored during the lockdown. To pass the time, you create an imaginary itinerary to Italy. After a couple of hours of merrily choosing the best places in Rome and Milan to see, you turn off the website and go back to your work. But then, you notice something strange....

Data Breach – Understanding the severity of it

 July 15, 2020

Estimated reading time: 2 minutes

A data breach is a security gap in which information or data is accessed or stolen without authorization. It is a breach of trust between the owner of the data and the party that accesses it without consent. To put it in simpler terms it a nonconsensual usage of someone’s...

Poulight- An info-stealing trojan might be teaching you how to play Minecraft

 June 22, 2020

Estimated reading time: 7 minutes

Poulight is an info-stealer trojan which most probably originated in Russia. It is written in the .NET and can collect sensitive information and deliver it to cybercriminals. Ever since its first appearance, it has been growing substantially and taking different forms. The main Infection vector remains spear-phishing emails. It was...

Maze ransomware continues to be a threat to the consumers

 June 18, 2020

Estimated reading time: 6 minutes

Maze is a recently highlighted ransomware among the ever-growing list of ransomware families. The ransomware is active from the past one year, although it came into limelight due to its new approach of publishing sensitive data of infected customers publicly. The malware uses different techniques to gain entry like the...

Malicious bots targeting e-commerce and travel websites – A perceivable threat

 June 15, 2020

Estimated reading time: 2 minutes

Malicious bots are becoming a major threat on the Internet. A recent survey suggested that attacks on applications, APIs, and mobile sites are on the rise. The top four industries that were attacked by malicious bots last year were e-commerce, travel, media, and online marketplaces, according to a report. Let...