Blog

December 2015

Top 10 Security Blog Posts of 2015

44

Estimated reading time: 2 minutes

As we turn over a new leaf, and anticipate new beginnings, it’s time to look at the top 10 security blog posts of 2015 in retrospect. #1. 6 Easy Steps to Tighten your Gmail Security! The post talks about some really easy steps that users must take to ensure that...

Quick Heal Detects Flash Exploit from China

2

Estimated reading time: 2 minutes

Quick Heal’s Malware Intelligence reporting system keeps a track of threats that are detected on its customers’ machines. From last quarter’s malware detection stats, we found that there were constant detection alerts for a well-known Adobe flash exploit in India. It is known as CVE-2015-5119. Our analysis of this threat...

Quick Heal Security Predictions for 2016: Be Alert, Be Secured and Stay Safe!

43

Estimated reading time: 3 minutes

It is time to say goodbye to 2015 and welcome 2016. New Year wishes, greetings and celebrations are on its way. And, so are New Year resolutions and predictions. Quick Heal family wishes you a Merry Christmas and a safe and secured New Year 2016. 2015 was an eventful year...

Popular News Website The Guardian Targeted by Hackers

52

Estimated reading time: 2 minutes

An article published in 2011 on popular news website The Guardian was found to be redirecting visitors to a landing page containing the notorious Angler Exploit Kit. Read the rest of the story from what follows. When it comes to hackers, no website is safe; not even the popular and...

Beware of the Apple ID Suspension Phishing Scam!

14

Estimated reading time: 2 minutes

A phishing scam is doing the rounds on the Internet, and is targeted towards users with Apple ID and iCloud account. Read on. Users of Apple products are apparently receiving emails that claim to be from Apple support. The email urges users to complete their account verification, failing which their...

4 Simple Tricks to Spot Fake LinkedIn Profiles

21
LinkedIn security tips

Estimated reading time: 3 minutes

Do you use LinkedIn to connect with your professional contacts and to interact or look around for potential employment opportunities? If yes, then you must have surely received LinkedIn connection requests from some people unknown to you at some point in time. Most people assume that LinkedIn is a reliable...

The Curious Case of Upatre

  • 3
    Shares
1 Comment

Estimated reading time: 6 minutes

What is Upatre? Upatre is a piece of malicious software that downloads and executes other malware. The name ‘Upatre’ comes from User Agent string “UPdATes downloadER” used by the malware. We have been observing Upatre infections since 2013 at the Quick Heal Threat Research lab. The curious thing here is...

Older Versions of Quick Heal Android Apps will no Longer be Supported

21

Estimated reading time: 1 minute

This post is intended to inform our users that we are soon ending our support for Quick Heal Total Security App and Quick Heal Mobile Security App running versions lower than the latest one (2.01.045). The earlier versions are outdated and do not employ the advanced security defenses that are...

Global Crackdown on 37,000 Fake Shopping Sites

25
Fake shopping sites

Estimated reading time: 2 minutes

Ecommerce websites are all the rage around the world today, and millions of goods exchange hands over the festive season in particular. There are several popular sites that a majority of people prefer shopping over; however, some people also choose some relatively unknown sites due to bigger discounts or more...

Security Vulnerabilities for Android and iOS Hit An All-time High in 2015

  • 1
    Share
2

Estimated reading time: 4 minutes

Quick Heal hopes it has been a good year for you. But, has it been a good year for your mobile devices as well? It has been an alarming year for both Android and iOS users. If Android users were vulnerable to Stagefright attacks, iOS users had their own share...