Blog
Quick heal blog
Here are some of the Subject seen in the mails containing links to malware file deceive as greetings send by some one close. Celebrate Your Independence Independence Day At The Park Fourth of July Party American Pride, On The 4th God Bless America Happy B-Day USA July 4th Family Day...
Mails send from egreetings.Com with malicious links is still floating around. The subject of these mails is formed using below keywords You’ve received [a|n] [greeting|] [postcard|ecard] from a [admirer|class-mate|colleague|family member|friend|mate|neighbor|neighbour|partner|school friend|school mate|school-mate|worshipper]! Here is one of such subject line used ” You’ve received a greeting card from a class mate!”...
Now, spammers have added PDF spam to the image spam. We have started receving e-mails having PDF file as attachment. So far we have seen e-mails with bogus text, often in German, each with a PDF in attachment advertising shares.
We have received a proof of concept virus called IRC.Badbunny that uses vulnerability in OpenOffice to infect Windows, Linux and Mac OS X. Respect to the host operating system the virus perform its actions to infect the compromised system. Badbunny will download an image from the remote server. More updates...
Microsoft has released Updates for seven critical updates. The vulnerabilities has been found in Excel, Word, Microsoft Office, Microsoft Exchange, Internet Explorer, CAPICOM and Windows DNS Server. All the vulnerabilities could be exploited by a remote user to execute arbitrary code. For more info click here
We have been receving reports of IE7 Beta spam mails containing links to download malwares. All the links in the mail points to “update.exe” file, which is been hosted on various URLs. IE7 Beta spam mail. Update.exe is a Trojan downloader program which in turn download other malware components from...
This months security patch consists update for Windows CSRSS, Microsoft Content Management Server, Universal Plug and Play, Microsoft Agent and the most widely exploited vulnerability in last few weeks ANI file (Vulnerabilities in GDI Could Allow Remote Code Execution). All the users and reader are requested to apply this patch....
http://www.microsoft.com/technet/security/Bulletin/MS07-017.mspx This update is posted earlier to the usual second Tuesday monthly Security Release because of the alarming increase of Malwares and sites exploiting the ANI vulnerability. All users and reader are requested to apply this patch.
Microsoft issued a Security Advisory about targeted attacks exploiting a vulnerability in the way Windows handles animated cursor (.ani) files. More Info at Microsoft Security Advisory We have reports of ANI file exploited and hosted on some of the sites. Added the detection of vulnerable ANI files as Exploit.MS05-002 in...
Quick Heal is one of the National Sponsor for Brand Equity Quiz 2007. Pune regional round was held on Saturday. Bhatkuli and D’Silva won the quiz and now will represent Pune region at the finals to be held in Mumbai. Our CEO Mr. Kailash Katkar handed prizes to thrid and...