Blog

June 2012

3 Security news updates you may have missed

10

Estimated reading time: 2 minutes

Malware causes printer outage and gibberish A malicious program called Milicenso afflicted printers across various offices in the world causing them to print garbled data. India, the US, Europe and South America were the majorly afflicted territories. Milicenso has been used in the past by malicious cyber groups and it...

Threatening apps doing the rounds on Google Play

11

Estimated reading time: 2 minutes

Here are a few potentially risky applications for Android that you should avoid. The first one is a variant of the notorious mobile spyware, Zeus. Users should actively avoid this app, whereas the second one has some serious privacy related implications. Zeus malware poses as security app A new version...

Phishing Scam: Axis Bank

3

Estimated reading time: 1 minute

Phishing scams are commonly carried out with specially crafted emails which look a lot like legitimate ones. Anybody who is new to the Internet can be easily tricked by a sophisticated phishing scam that attempts to get valuable information. Scammers send bulk emails to random email addresses in their possession....

Potential security threats at London 2012 Olympics

2

Estimated reading time: 2 minutes

The London 2012 Olympics begin on July 27 and many security experts have issued warnings against potential threats. Thanks to the large amount of technology at people’s disposal this edition is being billed as the ‘first truly digital games’. 12 million cyber attacks were reported during the Beijing 2008 Olympics,...

Facebook to allow credit card purchases: Wise move or not?

28

Estimated reading time: 2 minutes

The recent botched Facebook IPO, rising concerns about ad revenue, meeting the challenge of mobile monetization and looming privacy threats are pertinent issues that Facebook Inc. has to deal with. They are trying to find innovative solutions but there are bound to be hurdles along the way. Proposals to allow...

A look into the latest security news

0

Estimated reading time: 2 minutes

A lot changes in the security world with every passing day. Here is a brief roundup of some crucial developments that you may have missed out on. Twitter outage leaves millions speechless Bringing back memories of its nascent stage, Twitter crashed yesterday. Not once, but twice. The first crash occurred...

Registrations now open for Quick Heal Mac Security Beta Program

66

Estimated reading time: 1 minute

Quick Heal is proud to announce an upcoming product for the Apple Mac platform. This will cater to the security needs of Mac users and provide our high quality features and service to Apple lovers. Increased attacks on Mac vulnerabilities have raised awareness about security concerns on this platform, and...

Rising cyber crime: A grave cause for concern

2

Estimated reading time: 2 minutes

If you thought only Governments and industrial agencies are susceptible to cyber attacks, then you need to think again. According to a report by the Security and Defense Agenda (SDA), India ranks 5th in a worldwide list of countries affected by cyber crime. Ominously, the number of reported cyber crimes...

Future Watch III: Location based tracking threatens individual privacy

5

Estimated reading time: 2 minutes

Location mapping is a highly useful tool to study social behavior but it also poses a real threat to the privacy of individuals. GPS signals collected via smartphones are just the tip of the iceberg. The latest location mapping tool, known as Indoor Positioning System (IPS), makes use of Wi-Fi...

Are you the Spam – Junkie?

0

Estimated reading time: 3 minutes

Isn’t the Internet just the perfect thing? You log on to your email account and viola! Your friends, relatives, colleagues, close, semi-close and not even close people are just a ‘send’ away. Even the cute picture of a baby dressed in a pumpkin suit that you absolutely loved can be...