December 2015

Top 10 Security Blog Posts of 2015


Estimated reading time: 2 minutes

As we turn over a new leaf, and anticipate new beginnings, it’s time to look at the top 10 security blog posts of 2015 in retrospect. #1. 6 Easy Steps to Tighten your Gmail Security! The post talks about some really easy steps that users must take to ensure that...

Quick Heal Detects Flash Exploit from China


Estimated reading time: 2 minutes

Quick Heal’s Malware Intelligence reporting system keeps a track of threats that are detected on its customers’ machines. From last quarter’s malware detection stats, we found that there were constant detection alerts for a well-known Adobe flash exploit in India. It is known as CVE-2015-5119. Our analysis of this threat...

Popular News Website The Guardian Targeted by Hackers


Estimated reading time: 2 minutes

An article published in 2011 on popular news website The Guardian was found to be redirecting visitors to a landing page containing the notorious Angler Exploit Kit. Read the rest of the story from what follows. When it comes to hackers, no website is safe; not even the popular and...

Beware of the Apple ID Suspension Phishing Scam!


Estimated reading time: 2 minutes

A phishing scam is doing the rounds on the Internet, and is targeted towards users with Apple ID and iCloud account. Read on. Users of Apple products are apparently receiving emails that claim to be from Apple support. The email urges users to complete their account verification, failing which their...

4 Simple Tricks to Spot Fake LinkedIn Profiles

LinkedIn security tips

Estimated reading time: 3 minutes

Do you use LinkedIn to connect with your professional contacts and to interact or look around for potential employment opportunities? If yes, then you must have surely received LinkedIn connection requests from some people unknown to you at some point in time. Most people assume that LinkedIn is a reliable...

The Curious Case of Upatre

  • 3
1 Comment

Estimated reading time: 6 minutes

What is Upatre? Upatre is a piece of malicious software that downloads and executes other malware. The name ‘Upatre’ comes from User Agent string “UPdATes downloadER” used by the malware. We have been observing Upatre infections since 2013 at the Quick Heal Threat Research lab. The curious thing here is...

Older Versions of Quick Heal Android Apps will no Longer be Supported


Estimated reading time: 1 minute

This post is intended to inform our users that we are soon ending our support for Quick Heal Total Security App and Quick Heal Mobile Security App running versions lower than the latest one (2.01.045). The earlier versions are outdated and do not employ the advanced security defenses that are...

Global Crackdown on 37,000 Fake Shopping Sites

Fake shopping sites

Estimated reading time: 2 minutes

Ecommerce websites are all the rage around the world today, and millions of goods exchange hands over the festive season in particular. There are several popular sites that a majority of people prefer shopping over; however, some people also choose some relatively unknown sites due to bigger discounts or more...