Blog

January 2013

1 Comment

Estimated reading time: 4 minutes

Apple Macs are falsely believed to be invincible and completely safe against malware threats and security breaches. But as we recently discussed, this perpetual myth has gradually been broken over the years. Apple has subtly acknowledged this fact over the last year or so and has made major upheavals in...
2

Estimated reading time: 3 minutes

Facebook recently launched a notable new feature known as Graph Search. Mark Zuckerberg highlighted this feature as one of the 3 pillars of Facebook (after Newsfeed and Timeline) that make the social network relevant and personalized. But how safe is Graph Search? We feel that there are several security and...
2

Estimated reading time: 2 minutes

In a landmark development for the cyber security world, three cyber criminals have been charged in a Federal Manhattan Court in New York for stealing ‘tens of millions of dollars’ from online banking customers. The hackers were guilty of running Gozi, one of the most advanced and financially destructive viruses...
25

Estimated reading time: 3 minutes

There is a widespread misconception in the mainstream computing market that Apple Macs are more secure than Windows machines. In fact, some staunch Apple lovers even feel that since virus threats for Macs do not exist, no system protection software is essential. But how accurate is this belief? Our expertise...
25

Estimated reading time: 3 minutes

A massive Trojan botnet has been discovered in Android devices in China and this serves as a timely reminder of the growing vulnerability of the Android platform. Staggeringly, this botnet has infected more than 1 million Android devices that function in China. The high vulnerability of Android devices in China...
1 Comment

Estimated reading time: 2 minutes

India and hardware makers at loggerheads over cyber security guidelines The Indian Government wants all hardware manufacturers to include a mandatory brochure on cyber security. This stretches to all forms of hardware right from computers and mobile phones to modems and USB drives. However, the hardware companies are not too...
12

Estimated reading time: 3 minutes

After a massive Java 0-day vulnerability surfaced in August 2012, Oracle released an out-of-cycle update to combat the exploit. However, we advised our readers to simply disable Java on their web browsers to avoid the threat. Java has now become a highly vulnerable program that causes more trouble than it...
63

Estimated reading time: 2 minutes

In September 2012, Quick Heal launched an initiative for mobile users to forward suspicious SMS messages to a predesignated number. We received an impressive response as a lot of mobile users actively forwarded their spam messages and contributed towards this cause. The number to forward any suspicious SMS messages to...
23

Estimated reading time: 4 minutes

2012 has seen various malware threats and international cyberespionage tools evolve to new heights. However, the PC still remains the most accessible device for invading homes and planting malware. The number and nature of malware received by the Quick Heal Research & Development Labs in 2012 highlighted this fact. The...
78

Estimated reading time: 3 minutes

The open-source nature of the Android platform is its biggest strength and Achilles heel at the same time. Android handsets constituted almost 72% of global smartphone sales in Q3 2012 and 1.3 million Android devices are activated worldwide every single day. This is a staggering market share that Android enjoys...