Blog

May 2012

Infographic: The myth about smartphone invulnerability

0

Estimated reading time: 1 minute

Contrary to popular belief, the user-programmable miniature yet powerful mobile devices used for carrying data, sending e-mails, social networking, banking, gaming, downloading music and video aided with the rampant use of third party software, are not invincible. There are increasing problems from applications that upload malware or exploit vulnerabilities in...

Rougeware “Data Recovery” through Fake USPS email

0

Estimated reading time: 2 minutes

A few days backs I posted a blog regarding fake USPS (United States Postal Service) emails. Today I have once again come across a similar sort of fake email which pretends to be from USPS with the subject: “Your postal label is available.” The mail states that USPS failed to...

A few tricks to avoid the ‘Phishing’ trap

19

Estimated reading time: 3 minutes

Phishing is a technique that scammers use to obtain personal information by posing to be from a legitimate source. As a result, there are many people who fall for phishing emails. We regularly update this blog with details about fraudulent emails that attempt to phish for information, but now we...

Microsoft May-2012 Patch Tuesday Released

0

Estimated reading time: 3 minutes

Microsoft has released 7 bulletins covering a total of 11 vulnerabilities. Eight of this month’s issues are rated ‘Critical’ and they affect Windows, .NET, Office and Silverlight. The remaining issues affect Office and Windows. The following vulnerabilities are rated “Critical”: MS12-029- Vulnerability in Microsoft Word Could Allow Remote Code Execution...

Beware: Hacked websites can now infect your Android smartphone

0

Estimated reading time: 2 minutes

Our malware analysis team has discovered a malicious software that targets Android smartphones through hacked websites. This adds further credibility to our predictions about the growing threat of mobile malware. This new malware, known as NotCompatible, gets downloaded automatically when an Android user visits a hacked website. A hidden iframe...

Facebook scam – Kristen Stewart was taped drunk and having s#x

0

Estimated reading time: 2 minutes

Once again Facebook is flooded with a new scam carrying a very bold message – “Kristen Stewart was taped drunk and having s#x”. With such a bold message the attacker tries to lure more and more victims towards his fatal intentions. If you click on the link to watch the video,...

RBI Phishing scam: “Important account updates as a matter of urgent”

2

Estimated reading time: 2 minutes

Today I come across a fraudulent email which is exclusively designed for carrying out phishing attacks on several Indian banks like State Bank of India (SBI), Bank of India, Punjab National Bank, Union bank, ING Vysya and many more. This email pretends to be from the Reserve Bank of India (RBI)...

When Facebook Apps cease to be ‘Cool’

2

Estimated reading time: 3 minutes

Have you ever wondered why certain ads show up in the right hand corner of your Facebook page? A closer look at these ads and you will be surprised at the volumes they speak about your lifestyle choices – be it exclusive shoes from an e-retailer or a self-development course!...

Massive Smartphone sales reveal growing security concerns

2

Estimated reading time: 1 minute

According to recent Gartner and IDC reports, the total sales of smartphones in 2011 went as high as 490 million units. This number is estimated to rise to 600 million units in the current year and we need to take a second to take in these figures. Smartphones are steadily...

How third-party apps on smartphones could breach your privacy

6

Estimated reading time: 2 minutes

What makes a smartphone attractive and useful? The simple answer is the composition and number of compatible applications. On an average, an individual runs around 15-25 apps on his smartphone. Some Original Equipment Manufacturers (OEMs) provide custom made apps on a device, but the popularity of any handset is directly...