Blog

Vulnerability

 October 11, 2013

Estimated reading time: 3 minutes

WhatsApp Site taken down by Hackers WhatsApp has again made the headlines, thanks to a hacking group called KDMS Team. Netizens who visited the Web site of the most popular instant messaging service, reported defacement of the site. The company issued a statement admitting that their Web site was hijacked...
 September 19, 2013

Estimated reading time: 3 minutes

The Redmond Giant has issued a critical security advisory in the interest of Internet Explorer users. Reports are in that, a security vulnerability in all supported versions of IE has been let loose. What is the Vulnerability? In its official security advisory, Microsoft has reported the vulnerability to be a...
 September 13, 2013

Estimated reading time: 2 minutes

Grand Theft Auto 5 for PC is finally here! Wait, it’s a Malware! Grand Theft Auto 5 is set to release on 17 September, 2013. The release is for the Xbox 360 and PlayStation 3, and not for PC. But a torrent claiming to be the PC version of GTA...
 July 20, 2013

Estimated reading time: 2 minutes

Truecaller Gets a Bad Cyberattack Call Apparently, the website of popular online phonebook app, Truecaller, experienced a cyberattack, letting hackers gain unauthorized access to some data. The company has confirmed the same in its official blog. It seems, the Syrian Electronic Army is responsible for the cyberattack. News is up...
 March 2, 2013

Estimated reading time: 1 minute

Personal information of app users leaked on Google Play People who still disregard Android security and do not take privacy controls over the platform seriously, will be alarmed to learn this piece of news. An Australian app developer recently discovered that he had complete access to personal information of the...
 February 25, 2013

Estimated reading time: 3 minutes

At Quick Heal, we persistently look out for potential security threats that can lead to data breaches in the future. The rise of the ‘Internet of Things’ and omnipresent wireless connectivity for miscellaneous items is slowly opening up new attack avenues for hackers. A new kind of hacking attack has...
 February 20, 2013

Estimated reading time: 2 minutes

A new variant of Mac malware has been discovered and it is beginning to spread to Apple Macs through the networked printer file directory. The malware is a kind of ‘Backdoor Trojan’ and some sources have named this Trojan ‘Pintsized’. Apple Mac OS X is afflicted by this malware but...
 February 19, 2013

Estimated reading time: 3 minutes

Computer users who are well versed with security threats know why and how clever phishing pages must be avoided. Clear signs help to identify fake phishing pages but what does one do against a “watering hole attack”? What exactly is a watering hole attack? A watering hole attack is a...
 February 15, 2013

Estimated reading time: 1 minute

India – Where most of the world’s spam originates from A large amount of email spam originates in India. This interesting report shows that most of the world’s spam actually originates in India. Facebook has more than 50 million duplicate user accounts worldwide Facebook officials have claimed that there are...
 February 13, 2013

Estimated reading time: 3 minutes

When was the last time you carried out an image search on Google Images? Did you check the website the image was hosted on before you downloaded it on your computer or smartphone? Unknown to you, image searches are one of the biggest channels of malware over the Internet. Security...