Antivirus

Quick Heal AntiVirus Pro

Quick Heal Technologies is an Indian company which develops security and antivirus software under its own name, and produces enterprise offerings under the Seqrite brand.Quick Heal AntiVirus Pro is the company’s starter product for home users, although you wouldn’t know that from the feature list. It has a firewall, sandbox, anti-keylogger, intrusion detection, along with…


Quick Heal Technologies is an Indian company which develops security and antivirus software under its own name, and produces enterprise offerings under the Seqrite brand.

Quick Heal AntiVirus Pro is the company’s starter product for home users, although you wouldn’t know that from the feature list. It has a firewall, sandbox, anti-keylogger, intrusion detection, along with a ‘TrackMyLaptop’ antitheft system: it seems more like a suite than a standalone antivirus.

The program works on anything from Windows 2000 up, which is unusual when much of the competition now requires Windows 7 or later. (Although, of course, if you’re still using the long-unsupported Windows 2000 or XP, you’re got way more security problems to worry about than your choice of antivirus).

  • You can sign up for Quick Heal AntiVirus Pro here

Quick Heal AntiVirus Pro is priced at $30 (£23.08) for a one-year, one-device license. There’s a discount for adding more devices, but it’s relatively poor, with a three-device license costing $75 (£57.70), and five devices $125 (£96.15).

By comparison, the excellent Bitdefender Antivirus Plus is more expensive for a single device, at £30 ($39) a year. But you can cover five devices for only £50 ($65), and 10 devices for £55 ($71.50).

Quick Heal AntiVirus Pro

Setup

The Quick Heal AntiVirus Pro 30-day trial build was easy to find on the website, but getting it set up took more effort than we expected. We launched the installer, it displayed a couple of windows for a tiny fraction of a second, they disappeared before we could read them, and – that was it. There were no error messages, no logs or anything else to give us a clue about the cause.

Seeing an opportunity to test support, we raised a ticket explaining the problem, saying that our Windows 10 system had no other antivirus installed and we’d even disabled Windows Defender, with no change.

We hoped to get a detailed reply with Quick Heal-specific information. We would have accepted a page of generic advice (clear temporary folders, close other running apps, download and run the installer again). What we actually got, some 15 hours later, was the following:

‘Well, not only do you need to turn Windows Defender OFF, but also totally uninstall it.’

As troubleshooting advice goes, this was worse than useless, as there’s no way to ‘totally uninstall’ Windows Defender in Windows 10. Users who didn’t have the experience to dismiss this as nonsense might easily waste time messing around with their system, maybe even causing other problems, trying to do what the agent had asked.

With no effective help on offer, we switched to our emergency fallback position of installing to a fresh user account. Setup proceeded without any further hassles,

Read More

Be the first to write a comment.

Leave a Reply

Your email address will not be published. Required fields are marked *

Antivirus

Nearly 8,500 small and medium businesses faced cyberattacks through mimic AI tools in 2025: Kaspersky

Global cybersecurity company Kaspersky said on Wednesday that nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks in the year so far, where “malicious or unwanted software” was disguised as popular online productivity tools. In April, Kaspersky — a cybersecurity company that provides antivirus and other security software for computers and mobile devices

Global cybersecurity company Kaspersky said on Wednesday that nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks in the year so far, where “malicious or unwanted software” was disguised as popular online productivity tools.
In April, Kaspersky — a cybersecurity company that provides antivirus and other security software for computers and mobile devices — said that widespread adoption of artificial intelligence (AI) and machine learning technologies in recent years has provided “threat actors with sophisticated new tools to perpetrate attacks”…
Read More

Continue Reading
Antivirus

The best antivirus software of 2025: Stay safe from online attacks and ransomware scams

These antivirus tools can block online dangers, protect your data and shield your privacy and they are a lot cheaper than you think…

These antivirus tools can block online dangers, protect your data and shield your privacy and they are a lot cheaper than you think…
Read More

Continue Reading
Antivirus

Why This Budget-Friendly VPN & Antivirus Combo Is Blowing Up

If you’re looking to score a two-in-one deal, this discounted VPN + antivirus combo from Surfshark is sure to catch your eye…

If you’re looking to score a two-in-one deal, this discounted VPN + antivirus combo from Surfshark is sure to catch your eye…
Read More

Continue Reading
Antivirus

Hackers are using Google.com to deliver malware by bypassing antivirus software. Here’s how to stay safe

Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected This malware only activates during checkout, making it a silent threat to online payments The script opens a WebSocket connection for live control, completely invisible to the average user A new browser-based malware campaign has surfaced, demonstrating how attackers are


  • Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected
  • This malware only activates during checkout, making it a silent threat to online payments
  • The script opens a WebSocket connection for live control, completely invisible to the average user

A new browser-based malware campaign has surfaced, demonstrating how attackers are now exploiting trusted domains like Google.com to bypass traditional antivirus defenses.

A report from security researchers at c/side, this method is subtle, conditionally triggered, and difficult for both users and conventional security software to detect.

It appears to originate from a legitimate OAuth-related URL, but covertly executes a malicious payload with full access to the user’s browser session.

You may like

  • Google Apps Script abused to launch dangerous phishing attacks
  • Criminals hijacking subdomains of popular websites such as Bose or Panasonic to infect victims with malware: here’s how to stay safe
  • Cybercriminals have found a sneaky way of stealing tax accounts and even encrypted messages: here’s what you need to know

Malware hidden in plain sight

The attack begins with a script embedded in a compromised Magento-based ecommerce site which references a seemingly harmless Google OAuth logout URL: https://accounts.google.com/o/oauth2/revoke.

However, this URL includes a manipulated callback parameter, which decodes and runs an obfuscated JavaScript payload using eval(atob(…)).

The use of Google’s domain is central to the deception – because the script loads from a trusted source, most content security policies (CSPs) and DNS filters allow it through without question.

This script only activates under specific conditions. If the browser appears automated or the URL includes the word “checkout,” it silently opens a WebSocket connection to a malicious server. This means it can tailor malicious behavior to user actions.

Read More

Continue Reading