Blog

February 2013

Why USB drives and CDs are a security risk to your corporate network

8

Estimated reading time: 3 minutes

It is common knowledge that business organizations need to make significant investments to safeguard their data. This involves protecting the corporate network from external threats and internal parties (employees) as well. This is where effective Endpoint Security (EPS) comes into the picture. EPS is a network security concept that places...

Future Watch VII: War-texting threatens the future of Internet of things

1 Comment

Estimated reading time: 3 minutes

At Quick Heal, we persistently look out for potential security threats that can lead to data breaches in the future. The rise of the ‘Internet of Things’ and omnipresent wireless connectivity for miscellaneous items is slowly opening up new attack avenues for hackers. A new kind of hacking attack has...

Latest Mac malware on the rise, hides in networked printer directory

2

Estimated reading time: 2 minutes

A new variant of Mac malware has been discovered and it is beginning to spread to Apple Macs through the networked printer file directory. The malware is a kind of ‘Backdoor Trojan’ and some sources have named this Trojan ‘Pintsized’. Apple Mac OS X is afflicted by this malware but...

Web security basics: Watering hole attacks VS phishing attacks

34

Estimated reading time: 3 minutes

Computer users who are well versed with security threats know why and how clever phishing pages must be avoided. Clear signs help to identify fake phishing pages but what does one do against a “watering hole attack”? What exactly is a watering hole attack? A watering hole attack is a...

Security news and updates from the last week

1 Comment

Estimated reading time: 1 minute

India – Where most of the world’s spam originates from A large amount of email spam originates in India. This interesting report shows that most of the world’s spam actually originates in India. Facebook has more than 50 million duplicate user accounts worldwide Facebook officials have claimed that there are...

Malware Alert! The risk of image searches on Google and Bing

26

Estimated reading time: 3 minutes

When was the last time you carried out an image search on Google Images? Did you check the website the image was hosted on before you downloaded it on your computer or smartphone? Unknown to you, image searches are one of the biggest channels of malware over the Internet. Security...

Quick Heal proudly launches Total Security for Mac for Apple users

4

Estimated reading time: 3 minutes

Quick Heal is proud to announce its latest security solution – Quick Heal Total Security for Mac. Designed for the world’s most advanced operating system, Apple Mac OS X, Quick Heal Total Security for Mac is an intelligent security solution that provides advanced protection features without slowing down the performance...

More than Rs. 30 crore skimmed off Indian credit card users over 2 months

36

Estimated reading time: 2 minutes

Over the last few days it has come to light that a global syndicate has been skimming Indian credit card users for the last 2 months. Several cases have been reported where people’s credit card bills and registered mobile numbers have shown fraudulent and unauthorized transactions. It is believed that...

The first computer virus was designed for an Apple computer, by a 15 year old

34

Estimated reading time: 3 minutes

Contrary to popular belief, the first widespread computer virus that actively spread ‘in-the-wild’ was designed to target Apple computers. This might surprise some staunch Apple users who still feel that their Macs are completely invincible and cannot be infected with any kind of malware whatsoever. In this post we will...

Security news and updates from the last week

3

Estimated reading time: 1 minute

New York Times website breached by Chinese hackers The New York Times recently discovered that their computer systems were breached by Chinese hackers. The hackers stole corporate passwords of each and every employee and spied on more than 50 individuals in a time span of 4 months. Apparently these attacks...