Archives by Date

A history of Mac malware: The Apple of a virus developer’s eye

Apple Macs are falsely believed to be invincible and completely safe against malware threats and security breaches. But…

Facebook Graph Search: Useful search engine or phishers dream come true?

Facebook recently launched a notable new feature known as Graph Search. Mark Zuckerberg highlighted this feature as one…

Manhattan Court charges creators of Gozi, the world’s most destructive financial virus

In a landmark development for the cyber security world, three cyber criminals have been charged in a Federal…

Your Apple Mac does not need computer security: Myth or not?

There is a widespread misconception in the mainstream computing market that Apple Macs are more secure than Windows…

Massive Android botnet invades China: Could India be the next target?

A massive Trojan botnet has been discovered in Android devices in China and this serves as a timely…

Latest security news updates from the week gone by

India and hardware makers at loggerheads over cyber security guidelines The Indian Government wants all hardware manufacturers to…

As another Java flaw is discovered, is it time to disable Java completely?

After a massive Java 0-day vulnerability surfaced in August 2012, Oracle released an out-of-cycle update to combat the…

Spam SMS messages on the rise: Quick Heal mobile threat detection numbers

In September 2012, Quick Heal launched an initiative for mobile users to forward suspicious SMS messages to a…

The persistent threat of PC malware: Top Windows malware families of 2012

2012 has seen various malware threats and international cyberespionage tools evolve to new heights. However, the PC still…

The growing threat of mobile malware: Top Android malware families of 2012

The open-source nature of the Android platform is its biggest strength and Achilles heel at the same time….