Blog

Microsoft

 October 5, 2013

Estimated reading time: 2 minutes

Adobe Hacked – Data of 2.9 million Customers Compromised! Adobe has announced in its blog of a major security breach that compromised the data of 2.9 million of its customers. According to the company’s chief security officer, the hacked data mainly included customer IDs, encrypted passwords, encrypted credit and debit...
 September 21, 2013

Estimated reading time: 2 minutes

Microsoft warns Users of Critical Internet Explorer Vulnerability All supported versions of Internet Explorer, as reported by Microsoft, have a new security vulnerability. This security flaw can allow a hacker to use remote code execution (RME) and gain access to the victim’s computer. Incidents of malwares exploiting IE 8 and...
 July 17, 2013

Estimated reading time: 1 minute

Here’s a reminder for all our readers – Microsoft will no longer be providing any services to Windows XP operating system from April 8, 2014. In other words, machines still running this OS, will no longer receive security updates, and will be out of all kinds of support (paid or...
 January 9, 2013

Estimated reading time: 4 minutes

2012 has seen various malware threats and international cyberespionage tools evolve to new heights. However, the PC still remains the most accessible device for invading homes and planting malware. The number and nature of malware received by the Quick Heal Research & Development Labs in 2012 highlighted this fact. The...
 January 3, 2013

Estimated reading time: 2 minutes

Microsoft has successfully released a ‘Fix it solution’ for the recently discovered targeted attack, CVE-2012-4792. This attack was specifically targeted at users of Internet Explorer versions 6, 7 and 8. Users of Internet Explorer 9 and 10 were not affected. The attack exploited a vulnerability that allowed an attacker to...
 December 15, 2012

Estimated reading time: 2 minutes

Bangalore biggest target of cyber crimes in 2012 The cyber criminal cell at the Criminal Investigation Department (CID) has reported that out of all Indian cities, Bangalore faced the most number of cyber crimes in 2012. Close to 400 reported incidents have been witnessed till the end of November in...
 December 7, 2012

Estimated reading time: 2 minutes

Malware exploits Windows AutoRun Strains of malware that spread via the AutoRun feature that automatically launches programs when a USB drive or a disk is inserted into a machine is on the rise today. These kinds of malware exploit a certain bug in the AutoRun software so it is recommended...
 September 26, 2012

Estimated reading time: 2 minutes

AntiMalware vendors have the uphill task of tackling thousands of malware on a daily basis. One of the top challenges that AntiMalware vendors face is handling early boot malwares. Sophistication of malware has reached such a level that they take control of the system early in the boot process. This...
 September 21, 2012

Estimated reading time: 1 minute

Microsoft releases ‘Fix it’ tool for IE vulnerability Microsoft has released a temporary “Fix it” tool for the highly publicized Internet Explorer vulnerability. A full IE update will soon be released as well. The security hole exploited Internet Explorer users when they visited a malicious website and installed a trojan...
 September 18, 2012

Estimated reading time: 2 minutes

Microsoft recently won a court order to host “3322.org”, a nefarious Internet domain based in China, with its own dynamic DNS. The malicious domain hosts around 70,000 malicious subdomains and generates close to 500 different strains of malware that are distributed via counterfeit software. One of the most infamous botnets...