Blog
Quick heal blog
 April 21, 2010

Estimated reading time: 1 minute

Microsoft is working on a fix to get rid of Internet Explorer 8 vulnerability that can enable serious security attacks against websites that are otherwise safe. Ironically, the flaw resides in XSS (Cross-site scripting) filter, a protection feature in Internet Explorer 8 that’s designed to prevent XSS attacks against sites....
 April 19, 2010

Estimated reading time: 1 minute

Last week I had written a blog (see “Disguised PDF attack possible”) about possible attack using simple technique in Adobe Reader. It is being observed now that malware writers of Zeus malware are using the “/launch” command line parameter in Adobe Reader to launch a malicious code without exploiting an...
 April 16, 2010

Estimated reading time: 1 minute

Today I received a SMS message with following text: CONGRATS-YOU-WON-700,000-GBP- IN 2010-UK-TOYOTA WORLDWIDE- INT’L-MMOBILE-DRAWS-WINNING -#1,TO-CLAIM-YOUR PRIZE CONTACT MR.BEN VIA EMAIL:xxxxxxxx2010@hotmail.com Its not something new, malware writers/ cyber criminals are attempting to fool mobile phone users with such bogus text messages. Mobile user are increasing day by day so is the...
 April 15, 2010

Estimated reading time: 1 minute

A design flaw in Adobe’s popular PDF format which was published by Didier Stevens in first week of April can be used by hackers to install malwares on users’s computers. Its a policy flaw and not a security vulnerablity in Adobe Reader that could cause this. Researcher demonstrated this attack...
 April 14, 2010

Estimated reading time: 2 minutes

Microsoft has released its security bulletin summary for April 2010. This month Microsoft has released 11 bulletins which comprises of 18 vulnerabilities that have been addressed. Out of the 11 bulletins five bulletins have been rated “Critical”, five bulletins have been rated “Important” and one bulletin has been rated “Moderate”....
 April 8, 2010

Estimated reading time: 1 minute

Shadows in the Cloud report (link to PDF) which was recently published by researchers in Canada shows India most vulnerable and most infected nation amongst all. This report documents a complex ecosystem of cyber espionage that systematically compromised government, business, academic and other computer networks in India and other several...
 April 5, 2010

Estimated reading time: 2 minutes

Social networking sites are often targeted by Cyber criminals in the rising Web 2.0 Internet world. Recently with the completion of its 6th anniversary Facebook has reached mark of 400 million users. No doubt it is becoming soft target as it is easier to get huge online users community. Some...
 April 2, 2010

Estimated reading time: 2 minutes

Another new variant of Sality was reported on Saturday. As was the case with previous versions of Sality (like Sailty.R), this one is also a polymorphic EPO virus which replaces the entry point code of the original file. The main virus body is attached at the end of original file...
 April 1, 2010

Estimated reading time: 1 minute

The most talked about hacking contest Pwn2Own ended with bad news for Microsoft. The hackers were finally able to make their way and disable the Windows 7 data execution prevention (DEP) and address space layout randomization (ASLR). These two were the most highly praised security features of Windows 7. Security...
 March 31, 2010

Estimated reading time: 2 minutes

Recently I was going through the twitter web site for just checking on tweets on Ricky Martin news. Of course with a thought that it being a hot topic of yesterday there can be someone using this news as a means to attract a potential victim to their web site....