Blog

Droid defense

Google Play Store may soon get a built-in malware scanner

 October 15, 2012

Estimated reading time: 2 minutes

Google intends to release a future update to its Google Play Store that will provide client-side protection from malware present in malicious applications. This malware scanner will analyze an application when a user attempts to install it on an Android device. If there is a known strain of malware present...

Why leaving your smartphone WiFi ON causes more harm than good

 October 4, 2012

Estimated reading time: 2 minutes

Many users are under the misconception that leaving their smartphone WiFi switched ON only leads to a persistent battery drain. While this is not inaccurate, the truth is that there is another threat to be aware of. This is the threat of the ‘evil twin’. Anyone who has used WiFi...

Forward spam and unwanted SMS texts to +91-86000-44733

  • 1
    Share
 September 7, 2012

Estimated reading time: 2 minutes

Quick Heal Mobile Security has been protecting Android and BlackBerry users effectively. However, one of the most persistent threats to mobile devices is the abundance of spam, fraudulent, marketing and other unwanted text messages that people receive. SMS (Short Message Service) messages are the most widespread means of communication for...

The Rising Threat of SMiShing reaches millions of mobile users

 September 6, 2012

Estimated reading time: 2 minutes

Most of us have had to deal with rampant phishing emails at some point or the other, but the latest social engineering trick targets the device that we carry with us at all times – the mobile phone. SMiShing is an evolutionary form of phishing that uses text messages and...

Fake Quick Heal Mobile Security application found on Russian website

 August 24, 2012

Estimated reading time: 2 minutes

In the past we have highlighted numerous fake antivirus applications that are available through unsolicited third-party sources. Installing such apps can turn out to be highly risky and should be actively avoided by Android users. ‘Sideloading’ is the process of installing Android apps from third-party sources other than the Google...

Android fragmentation leads to security hazards

 August 14, 2012

Estimated reading time: 3 minutes

A new version of Android always brings with it tremendous amount of fanfare and adulation. Some versions gain more popularity than others and penetrate deeper markets. However, ‘fragmentation’ is a major hindrance that Android faces and the latest upgrades seldom reach all markets simultaneously. This creates several security loopholes that...

Notable Security features of Android 4.1 Jelly Bean

 August 6, 2012

Estimated reading time: 2 minutes

Android 4.1 (Jelly Bean) was announced on June 27, 2012 at the Google I/O conference. With Jelly Bean, Google aims to revamp Android after the underwhelming Honeycomb (version 3.0) and the moderate success and reach of Android 4.0 (Ice Cream Sandwich). Jelly Bean claims to be the most secure Android...

Security news updates from the last week

 July 27, 2012

Estimated reading time: 2 minutes

Android malware learns a new trick Mobile security software and a cautious nature can help you avoid risky apps over the Android Market (Google Play). But researchers have now discovered a way to convert good apps into malicious ones via an update, after they have been installed on a device....

Black Hat conference demonstrates Android and Meego NFC vulnerability

 July 27, 2012

Estimated reading time: 2 minutes

Yesterday I discussed the potential risks of NFC technology and how an attacker could ‘eavesdrop’ on NFC signals. If an attacker steals data by intercepting signals it could be crushing, but what if he could actively send signals and command the NFC enabled phone to do as he pleases? This...

Android malware creates clones of popular apps and tricks victims

 July 23, 2012

Estimated reading time: 3 minutes

Our malware analysis team has discovered a new social engineering trick used by criminals to target Android users. The attack vector guides the victim to a fake application market (or an untrustworthy third-party source). Once there, the victim downloads clones of popular apps that are cleverly disguised. Once such an...