Blog

December 2012

Top 10 Quick Heal security blogs for 2012

4

Estimated reading time: 2 minutes

2012 has been an eventful year for malware and security threats. A number of innovative social engineering tricks, malwares and threats reared their ugly heads and caused losses all around the world. We witnessed all kinds of attacks by hackers and posted a number of findings on our blog. Here...

Season’s greetings: Beware of security threats and fake phishing pages

22

Estimated reading time: 2 minutes

The festive season brings with it heart warming wishes and some great online deals for shoppers and discount seekers. Online retailers present some great discounts and add-ons at this time of the year and online sales see a massive surge in activity as a result. Unsurprisingly, attackers and phishers use...

Security news and updates from the last week

1 Comment

Estimated reading time: 2 minutes

Major security flaw found in Samsung devices, Samsung working on solution Samsung manufactures the Exynos 4 quad-core and dual-core chips for its flagship products like Samsung Galaxy S3 and the Galaxy Note II. However, a security flaw has been discovered in these SoC (system on a chip) processors that makes...

Germans demand anonymous accounts over Facebook: Wise move or not?

3

Estimated reading time: 2 minutes

German legislators have stoked the fires of Facebook privacy by ordering the social network to allow anonymous accounts and pseudonyms in place of real names of people. This demand originated from Schleswig-Holstein, the northernmost state of Germany. A data protection agency called Unabhaengiges Landeszentrum fuer Datenschutz (ULD) has emphasized the...

Future Watch VII: Your Smart TV opens up a new frontier for hacks and spying

7

Estimated reading time: 3 minutes

Just like smartphones arrived in most markets and obliterated regular feature phones, smart TV’s are expected to change the way we interact with our television sets. A smart TV, or hybrid TV, comes integrated with several web 2.0 applications and widgets that allow users to access the Internet and obtain...

Security news updates from the week gone by

2

Estimated reading time: 2 minutes

Bangalore biggest target of cyber crimes in 2012 The cyber criminal cell at the Criminal Investigation Department (CID) has reported that out of all Indian cities, Bangalore faced the most number of cyber crimes in 2012. Close to 400 reported incidents have been witnessed till the end of November in...

Simple security tips to avoid Twitter phishing scams

2

Estimated reading time: 3 minutes

Twitter is a great platform for sharing news, opinions and links. Created in 2006, Twitter has more than 500 million active users today and generates more than 350 million tweets every single day. This has naturally led to several phishing attacks over the microblogging platform. The fact that links are...

How does a hacker crack encrypted password databases?

12

Estimated reading time: 3 minutes

We recently published a post about the inherent dangers of passwords and how they are increasingly vulnerable thanks to user negligence. With so much data being safeguarded by elemental passwords, the need for a refined security layer is imperative. However, a common question we received was about how attackers actually...

Latest security news and updates

1 Comment

Estimated reading time: 2 minutes

Malware exploits Windows AutoRun Strains of malware that spread via the AutoRun feature that automatically launches programs when a USB drive or a disk is inserted into a machine is on the rise today. These kinds of malware exploit a certain bug in the AutoRun software so it is recommended...

Future Watch VI: Passwords are on their way out due to their vulnerability

10

Estimated reading time: 3 minutes

Every individual who is active on the Internet has a secret to protect. This secret is usually just a few characters long and is commonly known as the password. But how effective can a password really be? Passwords are a 20th century creation that were effective back when there was...