Blog

Tips

How social media is used to commit financial fraud

 September 21, 2020

Estimated reading time: 2 minutes

Social media is a fraudster’s heaven. There are billions of targets – Facebook itself had over 2.6 billion monthly active users in the first quarter of 2020. Because of the very nature of these platforms, users can be quite careless about the amount of personal information they post. For cybercriminals,...

If your smartphone is your life, here’s how you can keep it safe

 September 8, 2020

Estimated reading time: 3 minutes

We give a lot of thought when we think about upgrading our phones, but we often don’t give the same amount of consideration when it comes to our smartphone’s security. That’s a great pity because the prevalence of smartphones has made it a favorite target for all sorts of cybercriminals....

Parental Control – Here’s how you can regulate your child’s computer habits

 August 24, 2020

Estimated reading time: 2 minutes

Today’s generation of children is introduced to technology from the moment they are born. So it’s not a surprise to hear that, according to one study from 2013, children are using the Internet from the age of three! This year especially has seen a mass migration from the physical to...

HorseDeal Riding on The Curveball!

 February 5, 2020

Estimated reading time: 5 minutes

It’s surprising to see how quickly attackers make use of new vulnerabilities in malware campaigns. Microsoft recently patched a very interesting vulnerability in their monthly Patch Tuesday update for January 2020. It’s a spoofing vulnerability in Windows CryptoAPI (Crypt32.dll) validation mechanism for Elliptic Curve Cryptography (ECC) certificates. An attacker could...

CVE-2019-11815: Experts discovered a privilege escalation vulnerability in the Linux Kernel

 May 27, 2019

Estimated reading time: 2 minutes

Red Hat engineers and experts discovered a memory corruption vulnerability in Linux kernel, which is basically a flaw while implementation of RDS (Remote desktop Protocol) over TCP. This flaw has affected Red Hat, Ubuntu, Debian and SUSE and security advisories have been issued for all. This flaw could enable an...

Stay alert when planning your travels this holiday season

  • 15
    Shares
 December 18, 2018

Estimated reading time: 2 minutes

Planning a trip this holiday season? While, you spend a considerable amount of time shuffling money on online bookings for flights, hotels and cabs, take care that you DO NOT share your details on doubtful looking travel sites. Just like holidays are a busy time for you and me, it’s...

Beware of the Armage Ransomware – the File Destroyer!

  • 19
    Shares
 August 8, 2018

Estimated reading time: 3 minutes

In July last week, Quick Heal Security Labs detected a new ransomware called Armage. It appends ‘.Armage’ extension to files it encrypts. Armage ransomware uses the AES-256 encryption algorithm to encode files making them inoperable. It spreads via spam emails and corrupted text files. Technical analysis Once executed on the...

Beware of the ‘Free Cycle Distribution Yojana’ WhatsApp message. It’s fake!

  • 93
    Shares
 July 30, 2018

Estimated reading time: 3 minutes

As India’s Independence Day (15th of August) approaches, messages about free distribution schemes are doing the rounds on WhatsApp. Just recently, Quick Heal Security Labs detected a widespread circulation of one such message claiming that the Indian government will distribute free cycles to students on Independence Day, under the Free...

6 reasons why your computer is slower than a snail

  • 58
    Shares
 June 5, 2018
Slow computer

Estimated reading time: 3 minutes

Is your computer slowing down? Do you find it easier to move a mountain than multitasking on your machine? Here are 6 possible reasons that might explain the poor performance of your computer.

Twitter bug attack: All you need to know & ways to fight such attacks

  • 11
    Shares
 May 10, 2018
twitter bug

Estimated reading time: 3 minutes

One company with a turnover of $2.44bn 330 million users 500 million tweets per day What does it take to bring an upheaval in such a magnanimous company? A bug and . . . . well, that’s all it needs! Twitter Inc. reported a bug encounter a few weeks ago....