Blog
Sanjay Katkar

About Sanjay Katkar

Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of Quick Heal Technologies Limited. He holds a Masters in Computer Science from University of Pune, India. Sanjay has spearheaded the creation, subsequent development and maintenance of the core antivirus engine of Quick Heal. Over a span of 20 years, he has redesigned the entire product portfolio and elevated the role of the organization as a trustworthy IT security brand in more than 80 countries. He is a member of the Technology Steering Committee of National Security Database, India, and is a reporting member of The Wild List Organization International, USA. In 2016, Sanjay Katkar was named the Product Management Executive of the Year at the 12th Annual Global Excellence Awards overseen by Info Security Products Guide, a leading information security research and advisory guide, in San Francisco, USA.

‘Here you have’ virus hits some major companies in US.

 September 10, 2010

Estimated reading time: 1 minute

Thursday we observed a new worm that started to spread over Internet by emailing the address books of infected PC. The email contains the subject line as “Here you have” or “Just for you” and contains a link to a file which seems to be a PDF file. The email...

Zero Day critical vulnerability in Adobe Reader and Acrobat Reader

 September 9, 2010

Estimated reading time: 1 minute

A critical vulnerability (CVE-2010-2883) exists in Adobe Reader 9.3.4 and earlier versions for Windows, Macintosh and Unix and Adobe Acrobat 9.3.4 and earlier versions for Windows and Macintosh. This vulnerability could cause a crash and potentially allow an attacker to take control of the affected system. Currently we have not...

One more Twitter scam to increase fake followers.

 August 2, 2010

Estimated reading time: 2 minutes

Popularity of Twitter is growing and so are the scams on this popular social networking website. Its kind of cool to have Twitter account and having thousands of followers on Twitter is kind of icing on cake. This greed of having more followers is being targeted by the scammers on...

Few hours to Black Hat 2010, Vegas.

 July 28, 2010

Estimated reading time: 1 minute

Black Hat 2010 will kick start few hours from now. Lot of security experts and security community guys and gals will be looking forward for the latest news and happenings there. I am one of the guy who could not make it to the Black Hat and gona miss the...

StuxNet, CVE-2010-2568 misconceptions and facts

 July 21, 2010

Estimated reading time: 3 minutes

Lot is being discussed and written about the latest StuxNet worm/virus/trojan/rootkit. After analyzing the StuxNet samples and having closer look at the .LNK files I realized that lot of miss concepts are making round over the internet. Many of the security news websites have just copied the contents of blogs...

Cyber Criminals (Yahoo Boys) giving good business to Cybercafes in Nigeria

 July 13, 2010

Estimated reading time: 1 minute

Lagos in Nigeria had been witnessing lot of fraudulent Internet activities as cybercafés out there had a major customer base of cyber criminals. Recently the law enforcement authorities in Cyber Crime unit in Lagos are constantly revising their strategies in their efforts towards cleaning out scammers from the nation. Being...

Increase your twitter followers, an innovative way to get victims

 July 5, 2010

Estimated reading time: 1 minute

Recently I came across a below website that is promoting itself through twitter accounts of its members. When I saw its home page I was surprised to learn how people are coming out with innovative ways to collect innocent users login names and passwords of twitter accounts. Further this website...

Growing cyber crime rate indicates lack of skilled staff

 June 18, 2010

Estimated reading time: 2 minutes

Looking at the number of unique malwares that we are receiving in our lab on day to day basis, it clearly points to the fact that the cyber crime activity is growing exponentially. I was wondering when this will stop or come under control and the answer unfortunately is at...

Connecting a newly purchased gadget to your PC can be un-safe.

 June 5, 2010

Estimated reading time: 1 minute

We are very much used to connect a new trendy gadget to our laptop to explore its features and configure etc. Many gadgets has memory card or storage in it to support lot of features like digital camera, music players video players, Mobile phones. All of these when connected to...

Beware of Trojan.Bredolab that sends fake iTunes Gift Certificate!

 May 27, 2010

Estimated reading time: 1 minute

Yesterday I received a suspicious email with a attachment. The mail had subject line as: Thank you for buying iTunes Gift Certificate! I am a iPhone user and do have my account at Apple Store. Initially a thought came in my mind like whether somebody had hacked into my Apple...