Blog
Quick heal blog

Google Buzz surprised many of its users

 February 23, 2010

Estimated reading time: 1 minute

Google recently launched Google Buzz had to roll back the automatic implementation of the service to its users after strong protest from its users. Google Buzz is nice add on service to all GMail users that helps add social features to their account. Buzz tries to make the social interaction...

Xbox Phishing Site

 February 22, 2010

Estimated reading time: 1 minute

For years, PC users have been suffering from phishing threats. But now, the newest phishing attack targets users of Microsoft’s Xbox console. The phishing site (hosted in Timor-Leste) collects Xbox user’s account information (which is Windows Live E-mail address and Password). These Xbox Live accounts are then traded for real...

Alureon infected system show BSOD after MS10-015 applied

 February 18, 2010

Estimated reading time: 1 minute

If your system has restarted after applying the MS10-015, this might be a sign that your system is infected with the notorious W32.Alureon malware. It is one of complex and advanced piece of malware which is been in existence for quite sometime now. Some of the function it is loaded...

2010 Top 25 most dangerous programming errors

 February 17, 2010

Estimated reading time: 1 minute

The MITRE Corporation has come out with 2010 CWE/SANS Top 25 Most Dangerous Programming Errors. They have presented the data in such a neat fashion which is quite helpful for all the developer community. So you may be a developer, tester, designer, teacher or system administrator. There are lot of...

Important fixes for flash out, Adobe Acrobat fixes to arrive next.

 February 15, 2010

Estimated reading time: 1 minute

Adobe software is second only to Microsoft when it comes to number of exploits used in targeted hacker attacks. Last week Adobe published a fix for Flash that addresses a critical vulnerability in Flash. We advise all our users to upgrade to new version of Flash Player. It is also...

New wave of Phish mail seen on radar

 February 11, 2010

Estimated reading time: 1 minute

A new wave of the phish mail of Income tax department (Govt. of India) earlier blogged by Sanjay here, have been seen in our radar from today morning. Just started to see mails targeting Bank of India too. We have released update to protect all our user.

Advance Notification February Microsoft Bulletin Release.

 February 5, 2010

Estimated reading time: 1 minute

Yesterday Microsoft released the February bulletin. This month they plan to release 13 bulletin, five rated Critical, seven rated Important, and one rated Moderate – addressing 26 vulnerabilities. Eleven of the bulletins affect Windows and the remaining two affect Office. The recently published Advisory 980088, “Vulnerability in Internet Explorer Could...

After PS3 hack Xbox 360’s got hacked

 February 4, 2010

Estimated reading time: 1 minute

Christopher Tarnovsky, a researcher at Flylogic Engineering made it possible to hack TPM which was considered as most secure. TPM – Trusted Platform Module chips which are considered as hardware based industry standard securing chip designed by Trusted Computing Group is being used my many vendors for storing encryption keys...

Critical vulnerability reported in most of the versions of Internet Explorer.

 February 4, 2010

Estimated reading time: 1 minute

Core Security Technologies published the details of vulnerability (advisory ID CORE-2009-0625) what could be called as one of the critical vulnerability. The vulnerability can get exploited by cyber criminals to infect users computers visiting the specially crafted web pages. Core Security has reported the vulnerability to Microsoft since more than...

IPad raises security concerns in enterprise use.

 February 1, 2010

Estimated reading time: 1 minute

Apple iPad Lots of people are eager to have their hands on just announced iPad by Apple. Even though the official release is months ahead many individuals as well as enterprises too are thinking of the best use they can make of iPad. At the same time it is also...