Blog

July 2012

Security news updates from the last week

50

Estimated reading time: 2 minutes

Android malware learns a new trick Mobile security software and a cautious nature can help you avoid risky apps over the Android Market (Google Play). But researchers have now discovered a way to convert good apps into malicious ones via an update, after they have been installed on a device....

Black Hat conference demonstrates Android and Meego NFC vulnerability

4

Estimated reading time: 2 minutes

Yesterday I discussed the potential risks of NFC technology and how an attacker could ‘eavesdrop’ on NFC signals. If an attacker steals data by intercepting signals it could be crushing, but what if he could actively send signals and command the NFC enabled phone to do as he pleases? This...

New ICICI Bank phishing scam

8

Estimated reading time: 2 minutes

Phishing, an attempt to steal banking details, is a serious problem faced by banks worldwide. Commonly, a phishing attempt appears as an e-mail that comes from a known institution like a bank or a popular online shopping website. I recently came across such an email which pretends to be from...

Future Watch V: NFC and Shopping apps security risks

4

Estimated reading time: 2 minutes

Imagine a scenario where a customer walks into a supermarket to buy groceries. She receives a greeting and a list of offers and discounts for the day on her phone. The store then prepares a customizable shopping list based on past purchases. The store then provides an in-depth mapped shopping...

Malware attack through Facebook photo tag notification

29

Estimated reading time: 1 minute

This is a warning for Facebook users. A fraudulent email is circulating on the Internet claiming to be from Facebook and saying you’ve been tagged in a photo. The email probably looks like this: On a closer look the email is from “notification @faceboook.com” and not from a “Facebook.com” domain. This...

Android malware creates clones of popular apps and tricks victims

18

Estimated reading time: 3 minutes

Our malware analysis team has discovered a new social engineering trick used by criminals to target Android users. The attack vector guides the victim to a fake application market (or an untrustworthy third-party source). Once there, the victim downloads clones of popular apps that are cleverly disguised. Once such an...

Round-up of Security news updates from the last week

4

Estimated reading time: 2 minutes

IMs reach third-party contacts thanks to Skype bug A mysterious Skype bug sent messages (IMs) exchanged between two users, to random third-parties on either users’ list. Skype claims this occurred due to old versions of their app crashing on several platforms. This resulted in a lot of bad publicity for...

Upcoming security features of Windows 8 Enterprise edition

48

Estimated reading time: 2 minutes

In a recent post we discussed about Windows 8 security features for home users. This post talks about the security features of Windows 8 that caters to enterprises. Enterprise channels face different threats and hence require customized security features. Windows 8 Enterprise focuses on organizational needs but is only available...

Hype around ‘Dark Knight Rises’ attracts malicious parties

1 Comment

Estimated reading time: 1 minute

Christopher Nolan’s ‘Dark Knight Rises’ releases on July 20th and promises to be one of the most popular movies of all time. It is the final chapter of Nolan’s Batman trilogy and is sure to attract millions of viewers and search queries over the web. Inevitably, there will be a...

Quick Heal Opens New Support Center in South India

0

Estimated reading time: 1 minute

Quick Heal Technologies is pleased to announce that it has begun operation of a new Customer Support Center in South India. This is a strategic move by the Security Software leader to bring more streamlined and consistent services to its growing customer base in South India. The new Support Center...