Quick Heal Blog - Latest Computer Security News, Tips, and Advice (original) (raw)

5th January and The Tale of Joshi Virus: India’s First Global Computer Virus

In the cinematic tapestry of cybersecurity, where tales of intrigue and innovation collide, one story emerges from the…

Persistence in the Shadows: A Study of Zephyr Miner Exploiting System Services

Crypto Mining Crypto mining is the process by which individuals or organizations use computer power to solve complex…

Staying safe while gaming: how to ensure your children don’t become victims of financial fraud

If you’re a parent and haven’t been in touch with gaming for a while, you’d be surprised at…

Protect your children from financial frauds when gaming

Blockchain & Fraud Prevention: Strategies to overcome the cryptocurrency scam

What is Cryptocurrency? Cryptocurrency is a type of digital currency that generally only exists electronically. There is no…

cryptocurrency

Alert! Income tax refund SMS – Newest way of conducting bank fraud by cyber criminals

Scammers are literally on their toes all year round, but for all the wrong reasons, devising ways and…

Sextortion Scam: Blackmail scam emails that demand Bitcoin

What is Sextortion? Sextortion is a scam via email or any other medium to blackmail the victim and…

Sextortion Scam

Immediate steps to follow if you are a victim of banking fraud

In the recent past, innumerable cases have surfaced where there have been incidences of fraudulent charges on credit…

It’s a plastic world we live in. The proliferation of plastic money everywhere, in the form of debit…

atm-card-frauds

How social media is used to commit financial fraud

Social media is a fraudster’s heaven. There are billions of targets – Facebook itself has over 2.9 billion…

How to protect yourself from becoming victim of UPI frauds?

A new and interesting kind of cyber theft is making rounds in the cyber world. This time the…

Load More