Blog

September 2012

4

Estimated reading time: 1 minute

‘Dirty USSD’ hack thought to target Samsung Galaxy smartphones spreads to all Android devices Earlier this week a security researcher from Technical University, Berlin discovered a serious flaw in the Samsung Galaxy SII and SIII. Since the flaw could potentially trigger a factory reset on a device without the user’s...
148

Estimated reading time: 3 minutes

Last month we had highlighted the growing threat of a fake FBI notice in the United States which turned out to be a form of ‘Ransomware’. This ransomware was called Moneypak since it demanded a payment of a sum of money through a prepaid Moneypak credit card. In this scenario,...
4

Estimated reading time: 2 minutes

The composition of malware has changed considerably over the last few years. What used to be an independent and solo industry has now transformed into a professional syndicate. As security solution providers, it is our duty to stay abreast of such changes and evolution to alter our strategy. Here are...
3

Estimated reading time: 2 minutes

AntiMalware vendors have the uphill task of tackling thousands of malware on a daily basis. One of the top challenges that AntiMalware vendors face is handling early boot malwares. Sophistication of malware has reached such a level that they take control of the system early in the boot process. This...
3

Estimated reading time: 3 minutes

We repeatedly speak about the different techniques that attackers use to infect machines with malware. We also provide precautions that users can take to protect themselves from malware and phishing threats. In this post we will highlight the different strains of malware that are seen in the wild and what...
5

Estimated reading time: 1 minute

Microsoft releases ‘Fix it’ tool for IE vulnerability Microsoft has released a temporary “Fix it” tool for the highly publicized Internet Explorer vulnerability. A full IE update will soon be released as well. The security hole exploited Internet Explorer users when they visited a malicious website and installed a trojan...
3

Estimated reading time: 2 minutes

Microsoft recently won a court order to host “3322.org”, a nefarious Internet domain based in China, with its own dynamic DNS. The malicious domain hosts around 70,000 malicious subdomains and generates close to 500 different strains of malware that are distributed via counterfeit software. One of the most infamous botnets...
4

Estimated reading time: 1 minute

AntiSec collects 12 million Apple UDIDs from hacked FBI laptop, FBI denies it! AntiSec, a hacker group associated with Anonymous, claimed to have gotten their hands on 12 million Apple UDIDs from a hacked FBI laptop. They published 1 million of these IDs to validate their claim. However, the FBI...
  • 1
    Share
51

Estimated reading time: 2 minutes

Quick Heal Mobile Security has been protecting Android and BlackBerry users effectively. However, one of the most persistent threats to mobile devices is the abundance of spam, fraudulent, marketing and other unwanted text messages that people receive. SMS (Short Message Service) messages are the most widespread means of communication for...
12

Estimated reading time: 2 minutes

Most of us have had to deal with rampant phishing emails at some point or the other, but the latest social engineering trick targets the device that we carry with us at all times – the mobile phone. SMiShing is an evolutionary form of phishing that uses text messages and...