Blog

Security update

Java application software has always been extremely vulnerable due to its cross-platform nature. Exploits developed for this software platform can be used to affect various computer systems across diverse computing environments. Now, a new 0-day vulnerability is being exploited by attackers and this is causing mayhem across the computer security...
Gauss is a highly complex and sophisticated online banking malware that belongs to the same family as Flame, Duqu and Stuxnet. Gauss seems to be updated version of Stuxnet malware. Similar characteristics of these malwares are as follows: Use encryption method (XOR) Command and control (C&C) servers Use .LNK exploit...
A new version of Android always brings with it tremendous amount of fanfare and adulation. Some versions gain more popularity than others and penetrate deeper markets. However, ‘fragmentation’ is a major hindrance that Android faces and the latest upgrades seldom reach all markets simultaneously. This creates several security loopholes that...
In a recent post we discussed about Windows 8 security features for home users. This post talks about the security features of Windows 8 that caters to enterprises. Enterprise channels face different threats and hence require customized security features. Windows 8 Enterprise focuses on organizational needs but is only available...
Our post on renewal benefits received a lot of feedback and a lot of questions. We offer a bonus period of 2 months to users who renew their license before the expiry date. Here is a list of FAQs that provide answers to all the questions we received. Question: If...
Microsoft has released 7 bulletins covering a total of 11 vulnerabilities. Eight of this month’s issues are rated ‘Critical’ and they affect Windows, .NET, Office and Silverlight. The remaining issues affect Office and Windows. The following vulnerabilities are rated “Critical”: MS12-029- Vulnerability in Microsoft Word Could Allow Remote Code Execution...