Blog

August 2012

Oracle releases Java 0-day vulnerability security patch

39

Estimated reading time: 1 minute

Yesterday we highlighted the Java 7 0-day vulnerability (CVE-2012-4681) that necessitated immediate attention by disabling the Java plug-in. Oracle has now addressed this vulnerability by releasing a security patch that users should install on an immediate basis. In the past, Oracle has only released updates once every 4 months. Hence...

How to avoid the latest Java 0-day vulnerability

46

Estimated reading time: 2 minutes

Java application software has always been extremely vulnerable due to its cross-platform nature. Exploits developed for this software platform can be used to affect various computer systems across diverse computing environments. Now, a new 0-day vulnerability is being exploited by attackers and this is causing mayhem across the computer security...

Quick Heal 2013 offers domain and sub-domain control for HTTPS sites

38

Estimated reading time: 2 minutes

HTTPS protocols are utilized by many websites over the Internet today. This secure layer offers protection against man-in-the-middle attacks and phishing exploits. It also helps a user to detect fake websites that ask for personal information. Traditionally, domains that ask for credit/debit card details and login passwords commonly use this....

TrojanDownloader.Kuluoz.B distributed via image based email

7

Estimated reading time: 1 minute

Another United Parcel Service (UPS) spam has been discovered and this involves emails regarding failed package deliveries due to a faulty recipient address. The emails carry different subjects like: Your parcel is not delivered Error in the delivery address ID#7277 Failure to deliver ID #92198 Print your postal label UPS...

Quick Heal 2013 and Sandboxing ensure comprehensive protection

65

Estimated reading time: 2 minutes

The advent of Web 2.0, social engineering and widespread Browser Exploit Packs (BEP) has led to the rise of a large amount of threats while browsing the Internet. When one surfs the web and types an address in the URL bar, the website appears. Potentially, it can bring many unwanted...

Fake Quick Heal Mobile Security application found on Russian website

3

Estimated reading time: 2 minutes

In the past we have highlighted numerous fake antivirus applications that are available through unsolicited third-party sources. Installing such apps can turn out to be highly risky and should be actively avoided by Android users. ‘Sideloading’ is the process of installing Android apps from third-party sources other than the Google...

Seven terrific new features of Quick Heal 2013

508

Estimated reading time: 3 minutes

We are proud to announce the release of the Quick Heal 2013 product line. So what’s new? Here is a brief rundown of the new features that will help protect your machines from all kinds of unsolicited threats. Web Browser Sandbox Quick Heal 2013 brings the much awaited web browser...

How to activate two-factor authentication for Gmail

12

Estimated reading time: 3 minutes

Mat Honan, a tech journalist for Wired, recently witnessed an epic hacking of his Apple account, Amazon account, Macbook, iPhone, iPad, Twitter and Gmail. He admitted that all this was possible because he did not have two-factor (2-step) authentication for his Gmail account. In this post we will show you...

Gauss Malware – Updated version of Stuxnet

1 Comment

Estimated reading time: 2 minutes

Gauss is a highly complex and sophisticated online banking malware that belongs to the same family as Flame, Duqu and Stuxnet. Gauss seems to be updated version of Stuxnet malware. Similar characteristics of these malwares are as follows: Use encryption method (XOR) Command and control (C&C) servers Use .LNK exploit...

Round-up of the security news updates

2

Estimated reading time: 2 minutes

Website collects addresses of users who tweet the word ‘home’ This interesting website scans user tweets for the word ‘home’. If the person who tweeted the word has location tracking switched on, the website uses the location data and saves it as the address of that user. This information is...