Blog
Quick heal blog

Phishing email of Bank of India in Hindi.

 March 6, 2010

Estimated reading time: 2 minutes

Today I got 4 Bank of India phishing emails. As I had written a blog earlier the phishing attack on Bank of India is getting repeated every few days. Out of the 4 phishing attack emails that I received 3 were in English language but the fourth email was in...

Windows XP users do not press F1 if prompted by a website

 March 3, 2010

Estimated reading time: 1 minute

As Abhijit Kulkarni yesterday blogged about the .HLP vulnerability in Windows XP. See details below in his blog. I observed that Microsoft has rated this vulnerability as “Medium risk” as it needs user intervention. We are monitoring for any malicious exploit of this vulnerability being made by any malware. I...

Paypal phishing attack

 March 2, 2010

Estimated reading time: 2 minutes

I came across multiple emails in my inbox which were talking about my Paypal account being blocked. The mails had a subject line as “Your Papal account is suspended”. I immediately sensed it as phishing email. As earlier I had received emails indicating about payments that I made using Paypal...

Internet Explorer .HLP vulnerability on Windows XP

 March 2, 2010

Estimated reading time: 1 minute

Microsoft’s security team is investigating a security vulnerability reported at http://isec.pl/ by Maurycy Prodeus. The vulnerability is observed on operating system older than Windows Vista (i.e. Windows XP). In this, the attacker hosting a malicious website can remotely run arbitrary code by convincing the user to press the computer’s F1...

Spanish police arrested 3 hackers as suspected masterminds of Mariposa botnet.

 March 2, 2010

Estimated reading time: 1 minute

Mariposa botnet which has grown much stronger over last six months was posing a big challenge for security software developers. The botnet which was first observed in April-May 2009 has shown significant traffic growth over last six months indicating substantial number of compromised computers. The botnet was quite actively managed...

Rogueware “Security essentials 2010”

 February 27, 2010

Estimated reading time: 1 minute

Microsoft has warned Windows users to be cautious against a rogueware (fake software) which calls itself Security Essentials 2010 as opposed to Microsoft Security Essentials which is a genuine security product from Microsoft. Security essentials 2010 installs a fake virus scanner on your machine and blocks some processes. It also...

Search Engine Optimization (SEO) attacks are increasing rapidly

 February 26, 2010

Estimated reading time: 1 minute

One has to be very careful when using search engine for looking for information or news on the latest hot topics. There are more chances of getting malware infection after visiting the websites listed in the results. Malware authors are creating more and more webpages which are loaded with newly...

Operation B49

 February 26, 2010

Estimated reading time: 2 minutes

Since couple of weeks back Microsoft has been working on secret Operation B49 to wipe out Waledac botnet. Waledac is one of the largest botnets active and having major presence in US and European countries. This botnet is believed to be actively sending spam messages and had capacity to send...

Security threat on smartphones and tablets

 February 24, 2010

Estimated reading time: 1 minute

Computer scientists at Rutgers University have demonstrated that rootkits (a familiar threat on PCs) can now attack your smartphones or upcoming tablet computers (like iPad). Vinod Ganapathy, professor at Rutgers University in New Jersey says “Smart phones are essentially becoming regular computers. They run the same class of operating systems...

Google Buzz surprised many of its users

 February 23, 2010

Estimated reading time: 1 minute

Google recently launched Google Buzz had to roll back the automatic implementation of the service to its users after strong protest from its users. Google Buzz is nice add on service to all GMail users that helps add social features to their account. Buzz tries to make the social interaction...