Blog
Quick heal blog

Zeus malware uses the “/launch” command feature of Adobe Reader

 April 19, 2010

Estimated reading time: 1 minute

Last week I had written a blog (see “Disguised PDF attack possible”) about possible attack using simple technique in Adobe Reader. It is being observed now that malware writers of Zeus malware are using the “/launch” command line parameter in Adobe Reader to launch a malicious code without exploiting an...

SMS scams

 April 16, 2010

Estimated reading time: 1 minute

Today I received a SMS message with following text: CONGRATS-YOU-WON-700,000-GBP- IN 2010-UK-TOYOTA WORLDWIDE- INT’L-MMOBILE-DRAWS-WINNING -#1,TO-CLAIM-YOUR PRIZE CONTACT MR.BEN VIA EMAIL:xxxxxxxx2010@hotmail.com Its not something new, malware writers/ cyber criminals are attempting to fool mobile phone users with such bogus text messages. Mobile user are increasing day by day so is the...

Disguised PDF attack possible

 April 15, 2010

Estimated reading time: 1 minute

A design flaw in Adobe’s popular PDF format which was published by Didier Stevens in first week of April can be used by hackers to install malwares on users’s computers. Its a policy flaw and not a security vulnerablity in Adobe Reader that could cause this. Researcher demonstrated this attack...

Microsoft Security Bulletin released for the month of April

 April 14, 2010

Estimated reading time: 2 minutes

Microsoft has released its security bulletin summary for April 2010. This month Microsoft has released 11 bulletins which comprises of 18 vulnerabilities that have been addressed. Out of the 11 bulletins five bulletins have been rated “Critical”, five bulletins have been rated “Important” and one bulletin has been rated “Moderate”....

India completely un-prepared for cyber crime and espionage shows report

 April 8, 2010

Estimated reading time: 1 minute

Shadows in the Cloud report (link to PDF) which was recently published by researchers in Canada shows India most vulnerable and most infected nation amongst all. This report documents a complex ecosystem of cyber espionage that systematically compromised government, business, academic and other computer networks in India and other several...

Facebook Antivirus and wall spams

 April 5, 2010

Estimated reading time: 2 minutes

Social networking sites are often targeted by Cyber criminals in the rising Web 2.0 Internet world. Recently with the completion of its 6th anniversary Facebook has reached mark of 400 million users. No doubt it is becoming soft target as it is easier to get huge online users community. Some...

New variant of Sality

 April 2, 2010

Estimated reading time: 2 minutes

Another new variant of Sality was reported on Saturday. As was the case with previous versions of Sality (like Sailty.R), this one is also a polymorphic EPO virus which replaces the entry point code of the original file. The main virus body is attached at the end of original file...

Windows 7 most praised security features got compromised at Pwn2Own

 April 1, 2010

Estimated reading time: 1 minute

The most talked about hacking contest Pwn2Own ended with bad news for Microsoft. The hackers were finally able to make their way and disable the Windows 7 data execution prevention (DEP) and address space layout randomization (ASLR). These two were the most highly praised security features of Windows 7. Security...

Infection campaign using Twitter profile

 March 31, 2010

Estimated reading time: 2 minutes

Recently I was going through the twitter web site for just checking on tweets on Ricky Martin news. Of course with a thought that it being a hot topic of yesterday there can be someone using this news as a means to attract a potential victim to their web site....

No efforts are seen to be made to catch the cyber criminals in India.

 March 25, 2010

Estimated reading time: 2 minutes

Being in computer security industry for years I am seeing lot of cyber criminals activities day in and out. These activities are increasing exponentially in numbers. A growing threat by international cyber criminal organization has accelerated this situation. Daily the threats targeting Indian citizens, online commerce, enterprise networks and financial...