Blog

Vulnerability

As another Java flaw is discovered, is it time to disable Java completely?

 January 17, 2013

Estimated reading time: 3 minutes

After a massive Java 0-day vulnerability surfaced in August 2012, Oracle released an out-of-cycle update to combat the exploit. However, we advised our readers to simply disable Java on their web browsers to avoid the threat. Java has now become a highly vulnerable program that causes more trouble than it...

The persistent threat of PC malware: Top Windows malware families of 2012

 January 9, 2013

Estimated reading time: 4 minutes

2012 has seen various malware threats and international cyberespionage tools evolve to new heights. However, the PC still remains the most accessible device for invading homes and planting malware. The number and nature of malware received by the Quick Heal Research & Development Labs in 2012 highlighted this fact. The...

Microsoft releases a Fix it solution to prevent Internet Explorer hijacking vulnerability

 January 3, 2013

Estimated reading time: 2 minutes

Microsoft has successfully released a ‘Fix it solution’ for the recently discovered targeted attack, CVE-2012-4792. This attack was specifically targeted at users of Internet Explorer versions 6, 7 and 8. Users of Internet Explorer 9 and 10 were not affected. The attack exploited a vulnerability that allowed an attacker to...

Season’s greetings: Beware of security threats and fake phishing pages

 December 24, 2012

Estimated reading time: 2 minutes

The festive season brings with it heart warming wishes and some great online deals for shoppers and discount seekers. Online retailers present some great discounts and add-ons at this time of the year and online sales see a massive surge in activity as a result. Unsurprisingly, attackers and phishers use...

Future Watch VII: Your Smart TV opens up a new frontier for hacks and spying

 December 17, 2012

Estimated reading time: 3 minutes

Just like smartphones arrived in most markets and obliterated regular feature phones, smart TV’s are expected to change the way we interact with our television sets. A smart TV, or hybrid TV, comes integrated with several web 2.0 applications and widgets that allow users to access the Internet and obtain...

Security news updates from the week gone by

 December 15, 2012

Estimated reading time: 2 minutes

Bangalore biggest target of cyber crimes in 2012 The cyber criminal cell at the Criminal Investigation Department (CID) has reported that out of all Indian cities, Bangalore faced the most number of cyber crimes in 2012. Close to 400 reported incidents have been witnessed till the end of November in...

Simple security tips to avoid Twitter phishing scams

 December 13, 2012

Estimated reading time: 3 minutes

Twitter is a great platform for sharing news, opinions and links. Created in 2006, Twitter has more than 500 million active users today and generates more than 350 million tweets every single day. This has naturally led to several phishing attacks over the microblogging platform. The fact that links are...

How does a hacker crack encrypted password databases?

 December 10, 2012

Estimated reading time: 3 minutes

We recently published a post about the inherent dangers of passwords and how they are increasingly vulnerable thanks to user negligence. With so much data being safeguarded by elemental passwords, the need for a refined security layer is imperative. However, a common question we received was about how attackers actually...

Latest security news and updates

 December 7, 2012

Estimated reading time: 2 minutes

Malware exploits Windows AutoRun Strains of malware that spread via the AutoRun feature that automatically launches programs when a USB drive or a disk is inserted into a machine is on the rise today. These kinds of malware exploit a certain bug in the AutoRun software so it is recommended...

Future Watch VI: Passwords are on their way out due to their vulnerability

 December 6, 2012

Estimated reading time: 3 minutes

Every individual who is active on the Internet has a secret to protect. This secret is usually just a few characters long and is commonly known as the password. But how effective can a password really be? Passwords are a 20th century creation that were effective back when there was...