Blog

Hacking

Future Watch VII: War-texting threatens the future of Internet of things

 February 25, 2013

Estimated reading time: 3 minutes

At Quick Heal, we persistently look out for potential security threats that can lead to data breaches in the future. The rise of the ‘Internet of Things’ and omnipresent wireless connectivity for miscellaneous items is slowly opening up new attack avenues for hackers. A new kind of hacking attack has...

Latest Mac malware on the rise, hides in networked printer directory

 February 20, 2013

Estimated reading time: 2 minutes

A new variant of Mac malware has been discovered and it is beginning to spread to Apple Macs through the networked printer file directory. The malware is a kind of ‘Backdoor Trojan’ and some sources have named this Trojan ‘Pintsized’. Apple Mac OS X is afflicted by this malware but...

More than Rs. 30 crore skimmed off Indian credit card users over 2 months

 February 7, 2013

Estimated reading time: 2 minutes

Over the last few days it has come to light that a global syndicate has been skimming Indian credit card users for the last 2 months. Several cases have been reported where people’s credit card bills and registered mobile numbers have shown fraudulent and unauthorized transactions. It is believed that...

Security news and updates from the last week

 February 1, 2013

Estimated reading time: 1 minute

New York Times website breached by Chinese hackers The New York Times recently discovered that their computer systems were breached by Chinese hackers. The hackers stole corporate passwords of each and every employee and spied on more than 50 individuals in a time span of 4 months. Apparently these attacks...

Security news and updates from the last week

 December 21, 2012

Estimated reading time: 2 minutes

Major security flaw found in Samsung devices, Samsung working on solution Samsung manufactures the Exynos 4 quad-core and dual-core chips for its flagship products like Samsung Galaxy S3 and the Galaxy Note II. However, a security flaw has been discovered in these SoC (system on a chip) processors that makes...

Germans demand anonymous accounts over Facebook: Wise move or not?

 December 19, 2012

Estimated reading time: 2 minutes

German legislators have stoked the fires of Facebook privacy by ordering the social network to allow anonymous accounts and pseudonyms in place of real names of people. This demand originated from Schleswig-Holstein, the northernmost state of Germany. A data protection agency called Unabhaengiges Landeszentrum fuer Datenschutz (ULD) has emphasized the...

Future Watch VII: Your Smart TV opens up a new frontier for hacks and spying

 December 17, 2012

Estimated reading time: 3 minutes

Just like smartphones arrived in most markets and obliterated regular feature phones, smart TV’s are expected to change the way we interact with our television sets. A smart TV, or hybrid TV, comes integrated with several web 2.0 applications and widgets that allow users to access the Internet and obtain...

Security news updates from the week gone by

 December 15, 2012

Estimated reading time: 2 minutes

Bangalore biggest target of cyber crimes in 2012 The cyber criminal cell at the Criminal Investigation Department (CID) has reported that out of all Indian cities, Bangalore faced the most number of cyber crimes in 2012. Close to 400 reported incidents have been witnessed till the end of November in...

Simple security tips to avoid Twitter phishing scams

 December 13, 2012

Estimated reading time: 3 minutes

Twitter is a great platform for sharing news, opinions and links. Created in 2006, Twitter has more than 500 million active users today and generates more than 350 million tweets every single day. This has naturally led to several phishing attacks over the microblogging platform. The fact that links are...

How does a hacker crack encrypted password databases?

 December 10, 2012

Estimated reading time: 3 minutes

We recently published a post about the inherent dangers of passwords and how they are increasingly vulnerable thanks to user negligence. With so much data being safeguarded by elemental passwords, the need for a refined security layer is imperative. However, a common question we received was about how attackers actually...