Blog

Mobile devices

Beware: Hacked websites can now infect your Android smartphone

 May 9, 2012

Estimated reading time: 2 minutes

Our malware analysis team has discovered a malicious software that targets Android smartphones through hacked websites. This adds further credibility to our predictions about the growing threat of mobile malware. This new malware, known as NotCompatible, gets downloaded automatically when an Android user visits a hacked website. A hidden iframe...

Massive Smartphone sales reveal growing security concerns

 May 4, 2012

Estimated reading time: 1 minute

According to recent Gartner and IDC reports, the total sales of smartphones in 2011 went as high as 490 million units. This number is estimated to rise to 600 million units in the current year and we need to take a second to take in these figures. Smartphones are steadily...

What constitutes an effective mobile security suite?

 April 30, 2012

Estimated reading time: 3 minutes

With mobile malware on the rise and with millions of people jumping onto the smartphone bandwagon, the necessity to protect devices is now pronounced. Mobile scanning software is designed to protect smartphones from multiple threats. In an earlier post we discussed why your Android smartphone needs security, this article highlights...

5 reasons why your Android Smartphone needs security

 April 6, 2012

Estimated reading time: 4 minutes

Andy Rubin, co-founder of Android, says that there are nearly 850,000 new Android devices activated on a daily basis since February 2012. Since its inception in 2007, Android has grown at a phenomenal rate and has inched closer to toppling the massive ecosystem that Apple founder, Steve Jobs initiated. At...

Android Malware targeting users with fake Android Market website

 January 19, 2012

Estimated reading time: 2 minutes

Android malware is targeting users with a fake Android Market website URL that is nothing like the real Android Market website (https://market.android.com). When users click on the in-app ad they are taken to something that looks like the official Google Android Market page that may appear to loom like the...

Android Rougeware targeting “Stevens Creek Software”

 January 12, 2012

Estimated reading time: 1 minute

We have received a new malicious Android malware which is using the names of popular games and applications published under the name “Stevens Creek Software” to get installed on the user’s mobile. And the interesting thing about this rogueware is that unlike other Android malware which ask for numerous permissions...

Top 10 Malware Families (Mobile) of 2011

 December 31, 2011

Estimated reading time: 2 minutes

Today is the last day of the year and the right time to list out the top 10 Android Malware of this year. Below list is based on our report which is generated from the automated feedback that we collect from Quick Heal installations across India. Top 10 Malware Families...

“Battery Doctor” Android Scareware

 October 24, 2011

Estimated reading time: 2 minutes

A new “scareware” targeting mobile devices running Google’s Android operating system claims that it has the ability to recharge the battery, but in reality it is designed to steal information. When the program first executes, the overview window shown below appears. As you can see, it shows information about the...

Netflix application looks alike Android Malware

 October 17, 2011

Estimated reading time: 2 minutes

We have received a new malicous Android malware which looks like a genuine Netflix application and which can be used to steal Netflix account information. This is a classic case of trojanzied malware wherein the fake application, which is identical to the genuine application, lures users to enter their Netflix...

Malicious QR code used for spreading Android malware

 October 7, 2011

Estimated reading time: 2 minutes

Android malware writers have found a new and convenient way of delivering malware to users. This method makes use of malicious QR codes. QR (Quick Response) codes are a type of matrix barcode which contains encoded forms of data. They can also be used to store URL information. Most people...