Blog

March 2012

3

Estimated reading time: 2 minutes

Internet users are being warned about the latest disguise being used by malware authors in their attempt to infect people’s PCs. The fraud email shown below pretends to be from YouTube and carries the subject line – “Your video on the TOP of YouTube”. Quick Heal proactively blocks this email...
0

Estimated reading time: 2 minutes

Another FedEx fraudulent email is getting circulated on the Internet. The attacker is slowly trying to get more innovative as time goes by. The email pretends to be from fedex.com and presents a convincing reason for the user to open the attached file. The email says that the package weight...
45

Estimated reading time: 1 minute

This scam email pretends to be from the Reserve Bank of India (RBI) office and also carries a doc file as an attachment. In the doc file, well-crafted and professional looking statements are used by the scammer to trick the user. The scammer is offering the user some unclaimed money...
1 Comment

Estimated reading time: 2 minutes

The vulnerability lies in a part of Windows called the Remote Desktop Protocol (RDP) and could allow malicious hackers to run code without the users’ permission.The security hole affects Windows XP and all subsequent versions of Windows released, including the developer preview of Windows 8. This security update resolves two...
0

Estimated reading time: 2 minutes

There is nothing new about the fact that scam artists are once again using a celebrity’s name to spread their spam on Facebook. This time it’s Rihanna whose name is embroiled in the scam. This spam message, “OMG – I just hate RIHANNA after watching this video” followed by a...
0

Estimated reading time: 2 minutes

Microsoft has released six bulletins covering a total of seven vulnerabilities. Only one of this month’s issues is rated ‘Critical’ and it affects the Remote Desktop Protocol. The remaining issues affect the Windows kernel, DNS Server, Expression, Visual Studio and Windows. The following vulnerabilities are rated “Critical”: MS12-020 – Vulnerabilities...
2

Estimated reading time: 2 minutes

Music is most people’s entertainment choice across various platforms. There are many websites which provide features and facilities to listen to music online and to download some music as well. Yesterday I visited a website “http://www.hamara-sangeet.com”. It is an online radio service for Indian songs, where you can find some...
2

Estimated reading time: 1 minute

The possible Internet outage on 8th March is avoided as the federal judge has agreed to allow 120 days of extension for organisations and individuals to clean systems of the DNSChanger Trojan. This decision was taken late yesterday. As the earlier 4 month deadline of 8th March arrived, it was...
0

Estimated reading time: 1 minute

These updates address critical vulnerabilities in Adobe Flash Player 11.1.102.62 and earlier versions for Windows, Macintosh, Linux and Solaris, Adobe Flash Player 11.1.115.6 and earlier versions for Android 4.x and Adobe Flash Player 11.1.111.6 and earlier versions for Android 3.x and 2.x. These vulnerabilities could cause a crash and potentially...