Blog

Tips

Facebook Graph Search: Useful search engine or phishers dream come true?

 January 29, 2013

Estimated reading time: 3 minutes

Facebook recently launched a notable new feature known as Graph Search. Mark Zuckerberg highlighted this feature as one of the 3 pillars of Facebook (after Newsfeed and Timeline) that make the social network relevant and personalized. But how safe is Graph Search? We feel that there are several security and...

Simple security tips to avoid Twitter phishing scams

 December 13, 2012

Estimated reading time: 3 minutes

Twitter is a great platform for sharing news, opinions and links. Created in 2006, Twitter has more than 500 million active users today and generates more than 350 million tweets every single day. This has naturally led to several phishing attacks over the microblogging platform. The fact that links are...

The amazing features that Quick Heal PCTuner brings to the table

 December 4, 2012

Estimated reading time: 4 minutes

Just like a vehicle regularly needs servicing in order to function smoothly, a computer requires maintenance and care to perform at its best. Several factors and invalid files slow a PC down and negatively influence system performance, so it is imperative to clean this clutter from time to time. Doing...

5 things you should never reveal on social networks

  • 1
    Share
 November 21, 2012

Estimated reading time: 3 minutes

Many people fail to notice how their online lives endanger their day to day lives. An overload of information shared online, especially over social networks, is perhaps the biggest risk. Constant access to our devices and phones also allows us to share information at a level never seen before. But...

Have you used these easy and effective Quick Heal Parental Control tools?

 November 16, 2012

Estimated reading time: 2 minutes

Parents of school going kids have several questions when it comes to cyber security. Some of these issues involve the freedom and time that should be given to kids when they access the Internet. Other questions revolve around the mode of access in the first place. Today it is very...

Scammers steal credit card details in ways you never thought of

 October 27, 2012

Estimated reading time: 3 minutes

Cyber criminals and malicious scammers are constantly at work to devise new ways to steal confidential user data. Unfortunately, such attacks are not just restricted to the Internet. A recently discovered spate of attacks enables scammers to steal credit/debit card details and these methods are increasingly carried out in the...

How to get your kids interested in cyber security?

 October 10, 2012

Estimated reading time: 2 minutes

Getting less tech-savvy family members, especially teenagers and younger children, interested in computer security is a thankless task. It is necessary to teach them the implications of security breaches along with the importance of preventive measures. Children and young adults are more vulnerable to security risks like viruses, phishing websites...

Thinking of buying an Anti-spam product? Here’s a checklist

 July 3, 2012

Estimated reading time: 2 minutes

When your organization decides to shell out money on an anti-spam product for network security, there are a few important things that should be considered. Choosing an anti-spam product that provides you the right kind of protection, is cost-effective and doesn’t eat up system resources falls on the high-priority list....

A few salient features every Quick Heal user should know

 June 1, 2012

Estimated reading time: 2 minutes

Users of Quick Heal security products and readers of this blog are well aware of the exclusive features we offer our valued customers. We would like to highlight some ownership benefits that are unique to Quick Heal and prove how much we cherish our users. Here are some advantages of...