Blog
Rahul Thadani

About Rahul Thadani

Rahul is a web enthusiast and blogger, and has been writing about the computer security industry for the last three years. Following the latest technology trends, he has written several articles and blog posts related to the antivirus industry.

Threatening apps doing the rounds on Google Play

 June 28, 2012

Estimated reading time: 2 minutes

Here are a few potentially risky applications for Android that you should avoid. The first one is a variant of the notorious mobile spyware, Zeus. Users should actively avoid this app, whereas the second one has some serious privacy related implications. Zeus malware poses as security app A new version...

Potential security threats at London 2012 Olympics

 June 26, 2012

Estimated reading time: 2 minutes

The London 2012 Olympics begin on July 27 and many security experts have issued warnings against potential threats. Thanks to the large amount of technology at people’s disposal this edition is being billed as the ‘first truly digital games’. 12 million cyber attacks were reported during the Beijing 2008 Olympics,...

Facebook to allow credit card purchases: Wise move or not?

 June 25, 2012

Estimated reading time: 2 minutes

The recent botched Facebook IPO, rising concerns about ad revenue, meeting the challenge of mobile monetization and looming privacy threats are pertinent issues that Facebook Inc. has to deal with. They are trying to find innovative solutions but there are bound to be hurdles along the way. Proposals to allow...

A look into the latest security news

 June 22, 2012

Estimated reading time: 2 minutes

A lot changes in the security world with every passing day. Here is a brief roundup of some crucial developments that you may have missed out on. Twitter outage leaves millions speechless Bringing back memories of its nascent stage, Twitter crashed yesterday. Not once, but twice. The first crash occurred...

Rising cyber crime: A grave cause for concern

 June 20, 2012

Estimated reading time: 2 minutes

If you thought only Governments and industrial agencies are susceptible to cyber attacks, then you need to think again. According to a report by the Security and Defense Agenda (SDA), India ranks 5th in a worldwide list of countries affected by cyber crime. Ominously, the number of reported cyber crimes...

Future Watch III: Location based tracking threatens individual privacy

 June 18, 2012

Estimated reading time: 2 minutes

Location mapping is a highly useful tool to study social behavior but it also poses a real threat to the privacy of individuals. GPS signals collected via smartphones are just the tip of the iceberg. The latest location mapping tool, known as Indoor Positioning System (IPS), makes use of Wi-Fi...

Password Security: A dash of ‘salt’ and little of ‘hash’ to go please!

 June 11, 2012

Estimated reading time: 2 minutes

Online services like LinkedIn, eHarmony and Last.fm were recently hacked and millions of passwords were found on Russian hacker forums. This has led to a rise in public awareness about password securing procedures like ‘salting’ and ‘hashing’. Quick Heal users are protected from various real-time risks but attacks like this...

Future Watch II: Rogue SSL certificates on the rise

 June 4, 2012

Estimated reading time: 2 minutes

Continuing with our series of predicting potential security threats, this post delves into rogue SSL certificates. This attack vector allows phishers and social engineers to gain complete trust of their victims, the prospects of which are quite frightening. SSL (Secure Socket Layer) certificates are present on pages where a user...

New cyber espionage malware ‘Flamer’ is the most complex ever seen

 May 29, 2012

Estimated reading time: 2 minutes

Our Malware Analysis team has discovered a highly complex malware (Trojan.Flamer.A) that is written using the ‘Lua’ programming language. This malware is on par, if not stronger, than previously seen similar threats, Stuxnet and Duqu. The Iranian CERT (Computer Emergency Response Team) has many names for this worm – ‘Flame’,...

How to tell the difference between White-Hat, Grey-Hat and Black-Hat hackers

 May 28, 2012

Estimated reading time: 2 minutes

In the last post on hacktivism, we briefly mentioned three different types of hackers – white-hat hackers, grey-hat hackers and black-hat hackers. This post will delve into these three and help you understand the categories better. A hacker, as we all know by now, is someone who utilizes his understanding...