Blog

Vulnerability

FREAK Attack – Android and Apple Browsers at Risk

 March 5, 2015

Estimated reading time: 3 minutes

A new Internet vulnerability is affecting popular SSL clients across the web. Eerily named FREAK, this flaw allows malicious parties and attackers to force servers to automatically downgrade to weakened ciphers. Once this is done, the attackers can easily crack all encrypted communications of these weakened servers through advanced Man-In-The-Middle...

Beware of the Poodle Bug!

 October 16, 2014

Estimated reading time: 2 minutes

There’s a new security bug in town. Technically, it is called CVE­-2014­-3566, and elsewhere, as the Poodle Bug. Three Google engineers have discovered this security vulnerability in SSL version 3. Let’s know how this vulnerability may affect you. What is SSL? SSL (Secure Sockets Layer) is an encryption service that...

Is the End of Windows XP Support Putting ATMs at Risk?

 March 28, 2014

Estimated reading time: 4 minutes

The impending deadline of the discontinuation of Windows XP support by Microsoft (April 8, 2014) is fast approaching. Quick Heal has proactively warned retail users and enterprise users about the risks involved, but it is now time to understand a very different kind of threat associated with this approaching date....

Latest IT Security News and Updates for the Week

 March 8, 2014

Estimated reading time: 2 minutes

There are several interesting new developments in the security world, and here are some of the news stories from the week gone by that you should be looking at. Facebook Whatsapp deal for $19 billion still not completed due to privacy concerns If you have doubts about your private data...

How Security Savvy are Your Staff?

 March 6, 2014

Estimated reading time: 3 minutes

Modern business enterprises deal with large stacks of crucial data that need to be processed at high speeds. As a result, security is often a blind spot for them. Basic enterprise security tips are overlooked for the sake of convenience and this eventually leads to security breaches or data loss....

How to Recover from a Malware Infection

  • 1
    Share
 March 4, 2014

Estimated reading time: 3 minutes

Avoiding and preventing malware on a computer is far simpler than removing it from an infected machine. Nevertheless, once a machine has been infected with malware, it is imperative to remove it immediately. Clear signs like lowered speed, popups, disabled functionality and more, indicate the presence of malware on a...

This Week’s Latest IT Security News and Updates

 February 7, 2014

Estimated reading time: 2 minutes

Beware of Emails Containing Free FIFA Tickets Malware artists sure are opportunistic. News are up that they are using the FIFA bait to lure their victims. Reportedly, users are receiving emails notifying them that they have won free tickets to 20th FIFA World Cup. The emails contain links to a...

Latest IT Security News, Updates and Alerts from the Weeks Gone by

 December 7, 2013

Estimated reading time: 2 minutes

Google Nexus Phone Series may have Trouble from SMS Flood Attacks Reportedly, sending a large number of flash SMSs to Galaxy Nexus, Nexus 4, and Nexus 5 may cause these phones to reboot or interfere with their network connection. Bombarding any one of these phones with just 30 Flash Messages...

Zero-day Vulnerability Hits Microsoft Office – Temporary Patch Available

 November 7, 2013

Estimated reading time: 2 minutes

Microsoft has issued a new security advisory against an exploit that hackers are using to target a zero-day vulnerability in Microsoft Office. A temporary ‘Fix It’ tool has been released by the company; a permanent fix is yet to be rolled out. A pre-existing vulnerability in some versions of Microsoft...

This Week’s Latest News and Updates on Information Security

 October 25, 2013

Estimated reading time: 2 minutes

Official PHP Website Falls Prey to Hackers Did you recently visit the official website of the open-source PHP programming language? Let’s hope you did not. News are up that the site has been compromised, and is being used to drop a Trojan horse onto systems used to visit the site....