Blog
Quick heal blog

Why is smartphone security so important?

 July 28, 2020

Estimated reading time: 3 minutes

Let’s pause for a second here and think about the astonishingly smart palm-sized device – that is our phone. A decade or two ago it would have been impossible to imagine all the things that a modern-day smartphone can do. A day without our smartphone is quite unimaginable. From remembering...

Is your router exposed to cyber threats? Here’s how to safeguard it

 July 23, 2020

Estimated reading time: 4 minutes

Given that a large number of people use a router to connect to the web, chances are that maybe you using a router at home to access the Internet. While you must be aware of a host of cybersecurity threats that you are exposed to while you browse the Internet,...

Are you being tracked by websites you visit?

 July 17, 2020

Estimated reading time: 2 minutes

You’re bored during the lockdown. To pass the time, you create an imaginary itinerary to Italy. After a couple of hours of merrily choosing the best places in Rome and Milan to see, you turn off the website and go back to your work. But then, you notice something strange....

Data Breach – Understanding the severity of it

 July 15, 2020

Estimated reading time: 2 minutes

A data breach is a security gap in which information or data is accessed or stolen without authorization. It is a breach of trust between the owner of the data and the party that accesses it without consent. To put it in simpler terms it a nonconsensual usage of someone’s...

How to make online classes safe for your children from digital threats

 July 8, 2020

Estimated reading time: 2 minutes

Accept it or not we are now living in a “new normal” where the world has changed dramatically. A year ago it would have been hard to believe that children would have to take online classes from home instead of going to school. But it has happened and like it...

New malware via gaming portals may affect thousands of personal computers

 July 2, 2020

Estimated reading time: 2 minutes

Gamers beware. A report by Chinese cybersecurity researchers recently discovered a malicious botnet campaign that infected hundreds of thousands of systems. This botnet campaign was spread through malware via pirate gaming portals. The attack has been traced back to a China-based cybercrime group called DoubleGun which has amassed thousands of...

70% apps in common use have security flaws. Are you protected?

 June 29, 2020

Estimated reading time: 2 minutes

Most of the popular applications we use today are built upon open-source libraries – free code repositories that help developers to create readymade applications. But, how safe are those libraries? According to a recent report, not very. Almost 70 percent of apps in common use were found to have flaws...

BHIM App attacked! Secure your online banking today with Quick Heal

 June 25, 2020

Estimated reading time: 2 minutes

India’s BHIM (Bharat Interface for Money) app used for mobile payments was reported recently to have suffered a massive data leakage of 7.26 million records, according to a security research company. According to the report, the leak happened due to a flaw in a website linked to the BHIM app...

Poulight- An info-stealing trojan might be teaching you how to play Minecraft

 June 22, 2020

Estimated reading time: 7 minutes

Poulight is an info-stealer trojan which most probably originated in Russia. It is written in the .NET and can collect sensitive information and deliver it to cybercriminals. Ever since its first appearance, it has been growing substantially and taking different forms. The main Infection vector remains spear-phishing emails. It was...

Maze ransomware continues to be a threat to the consumers

 June 18, 2020

Estimated reading time: 6 minutes

Maze is a recently highlighted ransomware among the ever-growing list of ransomware families. The ransomware is active from the past one year, although it came into limelight due to its new approach of publishing sensitive data of infected customers publicly. The malware uses different techniques to gain entry like the...