Blog

Smartphone security

Android malware disguises itself as Google+ App

 August 18, 2011

Estimated reading time: 2 minutes

We have received a new Android malware from the Anrdoid market whose icon is like a Google+ app. This app is particularly dangerous as it gathers GPS data, call logs, text messages and even records phone calls before sending the information off to a remote server. After installation it asks...

Android Focus Stealing Vulnerability

 August 10, 2011

Estimated reading time: 2 minutes

Android allows applications to voluntarily come to the foreground or to become active while user is using another application. However, because Android’s SDK (Software Development Kit) allows apps to be pushed to the foreground, Android allows users to dismiss and override this behaviour be hitting the back button. This Android...

Conversation spying Android Trojan

 August 3, 2011

Estimated reading time: 2 minutes

It seems that Android malware is improving day by day. We have received an interesting malware which can store call logs, record whole conversations and even send them to remote computers owned by malicious controllers. Most of the previous Android malware we have seen has either sent text messages or...

Quick Heal Mobile Security for Android based mobile devices launched

 August 1, 2011

Estimated reading time: 1 minute

Today is the official launch for Quick Heal Mobile Security for Android smartphones and tablets. The Quick Heal team is proud of entering the new and amazing world of Android. Thank you for the overwhelming response to the pre-launch registration offer. With 5,000+ registrations on the first day of the...

Phone Hacking: Are we safe?

 July 19, 2011

Estimated reading time: 1 minute

Recent international news about the hacking of celebrities phones by news reporters from News of the World, a now defunct British tabloid newspaper published by News International, are doing the rounds. The allegations state that the individuals and reporters working for the newspaper are engaged in phone hacking. All this...