Blog

Smartphone security

 April 6, 2013

Estimated reading time: 4 minutes

This post is in continuation with our previous post on Instagram and will discuss how you can control your privacy in the app. In Instagram the key word is ‘public.’ Once an Instagram profile has been created, anyone can browse these online profiles and “follow” other Instagram users. Here comes the...
 April 3, 2013

Estimated reading time: 3 minutes

In an earlier post we talked about various apps and the risks associated with them. In these subsequent posts, we will scratch the surface a little bit and dig a little deeper to understand the privacy implications of one app in particular – Instagram. Now, that our very own Big...
 March 5, 2013

Estimated reading time: 2 minutes

Uncontrolled in-app purchases can result in huge bills for your Smartphone. However, the feature can be easily turned off. Needless to say, ‘free’ apps in Google Play or iTunes Store are always more preferable than their ‘paid’ counterparts. However, these apps work using a ‘freemium’ model to generate revenue. Yes,...
 February 25, 2013

Estimated reading time: 3 minutes

At Quick Heal, we persistently look out for potential security threats that can lead to data breaches in the future. The rise of the ‘Internet of Things’ and omnipresent wireless connectivity for miscellaneous items is slowly opening up new attack avenues for hackers. A new kind of hacking attack has...
 February 15, 2013

Estimated reading time: 1 minute

India – Where most of the world’s spam originates from A large amount of email spam originates in India. This interesting report shows that most of the world’s spam actually originates in India. Facebook has more than 50 million duplicate user accounts worldwide Facebook officials have claimed that there are...
 January 21, 2013

Estimated reading time: 3 minutes

A massive Trojan botnet has been discovered in Android devices in China and this serves as a timely reminder of the growing vulnerability of the Android platform. Staggeringly, this botnet has infected more than 1 million Android devices that function in China. The high vulnerability of Android devices in China...
 January 16, 2013

Estimated reading time: 2 minutes

In September 2012, Quick Heal launched an initiative for mobile users to forward suspicious SMS messages to a predesignated number. We received an impressive response as a lot of mobile users actively forwarded their spam messages and contributed towards this cause. The number to forward any suspicious SMS messages to...
 January 8, 2013

Estimated reading time: 3 minutes

The open-source nature of the Android platform is its biggest strength and Achilles heel at the same time. Android handsets constituted almost 72% of global smartphone sales in Q3 2012 and 1.3 million Android devices are activated worldwide every single day. This is a staggering market share that Android enjoys...
 December 21, 2012

Estimated reading time: 2 minutes

Major security flaw found in Samsung devices, Samsung working on solution Samsung manufactures the Exynos 4 quad-core and dual-core chips for its flagship products like Samsung Galaxy S3 and the Galaxy Note II. However, a security flaw has been discovered in these SoC (system on a chip) processors that makes...
 December 15, 2012

Estimated reading time: 2 minutes

Bangalore biggest target of cyber crimes in 2012 The cyber criminal cell at the Criminal Investigation Department (CID) has reported that out of all Indian cities, Bangalore faced the most number of cyber crimes in 2012. Close to 400 reported incidents have been witnessed till the end of November in...