Blog

Security update

 August 30, 2012

Estimated reading time: 2 minutes

Java application software has always been extremely vulnerable due to its cross-platform nature. Exploits developed for this software platform can be used to affect various computer systems across diverse computing environments. Now, a new 0-day vulnerability is being exploited by attackers and this is causing mayhem across the computer security...
 August 20, 2012

Estimated reading time: 2 minutes

Gauss is a highly complex and sophisticated online banking malware that belongs to the same family as Flame, Duqu and Stuxnet. Gauss seems to be updated version of Stuxnet malware. Similar characteristics of these malwares are as follows: Use encryption method (XOR) Command and control (C&C) servers Use .LNK exploit...
 August 14, 2012

Estimated reading time: 3 minutes

A new version of Android always brings with it tremendous amount of fanfare and adulation. Some versions gain more popularity than others and penetrate deeper markets. However, ‘fragmentation’ is a major hindrance that Android faces and the latest upgrades seldom reach all markets simultaneously. This creates several security loopholes that...
 July 19, 2012

Estimated reading time: 2 minutes

In a recent post we discussed about Windows 8 security features for home users. This post talks about the security features of Windows 8 that caters to enterprises. Enterprise channels face different threats and hence require customized security features. Windows 8 Enterprise focuses on organizational needs but is only available...
 July 18, 2012

Estimated reading time: 2 minutes

Windows 8 is scheduled to hit the market in October and promises a new era for desktops. Microsoft aims to integrate the PC market with the mobile market by unifying the Metro UI across all platforms. However, Windows has always brought a number of security threats due to its massive...
 July 3, 2012

Estimated reading time: 2 minutes

When your organization decides to shell out money on an anti-spam product for network security, there are a few important things that should be considered. Choosing an anti-spam product that provides you the right kind of protection, is cost-effective and doesn’t eat up system resources falls on the high-priority list....
 June 6, 2012

Estimated reading time: 2 minutes

Our post on renewal benefits received a lot of feedback and a lot of questions. We offer a bonus period of 2 months to users who renew their license before the expiry date. Here is a list of FAQs that provide answers to all the questions we received. Question: If...
 June 1, 2012

Estimated reading time: 2 minutes

Users of Quick Heal security products and readers of this blog are well aware of the exclusive features we offer our valued customers. We would like to highlight some ownership benefits that are unique to Quick Heal and prove how much we cherish our users. Here are some advantages of...
 May 9, 2012

Estimated reading time: 3 minutes

Microsoft has released 7 bulletins covering a total of 11 vulnerabilities. Eight of this month’s issues are rated ‘Critical’ and they affect Windows, .NET, Office and Silverlight. The remaining issues affect Office and Windows. The following vulnerabilities are rated “Critical”: MS12-029- Vulnerability in Microsoft Word Could Allow Remote Code Execution...
 March 16, 2012

Estimated reading time: 2 minutes

The vulnerability lies in a part of Windows called the Remote Desktop Protocol (RDP) and could allow malicious hackers to run code without the users’ permission.The security hole affects Windows XP and all subsequent versions of Windows released, including the developer preview of Windows 8. This security update resolves two...