Blog

Security update

CVE-2019-11815: Experts discovered a privilege escalation vulnerability in the Linux Kernel

 May 27, 2019

Estimated reading time: 2 minutes

Red Hat engineers and experts discovered a memory corruption vulnerability in Linux kernel, which is basically a flaw while implementation of RDS (Remote desktop Protocol) over TCP. This flaw has affected Red Hat, Ubuntu, Debian and SUSE and security advisories have been issued for all. This flaw could enable an...

Security Vulnerabilities for Android and iOS Hit An All-time High in 2015

  • 1
    Share
 December 4, 2015

Estimated reading time: 4 minutes

Quick Heal hopes it has been a good year for you. But, has it been a good year for your mobile devices as well? It has been an alarming year for both Android and iOS users. If Android users were vulnerable to Stagefright attacks, iOS users had their own share...

This Week’s Bytes of the Latest IT Security News and Updates

 October 5, 2013

Estimated reading time: 2 minutes

Adobe Hacked – Data of 2.9 million Customers Compromised! Adobe has announced in its blog of a major security breach that compromised the data of 2.9 million of its customers. According to the company’s chief security officer, the hacked data mainly included customer IDs, encrypted passwords, encrypted credit and debit...

Adobe addresses serious vulnerabilities with its latest patches

 April 10, 2013

Estimated reading time: 1 minute

Adobe Systems has released improved versions of Flash Player, Shockwave Player and ColdFusion to patch critical vulnerabilities in these. As stated by Adobe “these vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system” The new versions of Flash Player for Windows and...

Web security basics: Watering hole attacks VS phishing attacks

 February 19, 2013

Estimated reading time: 3 minutes

Computer users who are well versed with security threats know why and how clever phishing pages must be avoided. Clear signs help to identify fake phishing pages but what does one do against a “watering hole attack”? What exactly is a watering hole attack? A watering hole attack is a...

Security news and updates from the last week

 February 1, 2013

Estimated reading time: 1 minute

New York Times website breached by Chinese hackers The New York Times recently discovered that their computer systems were breached by Chinese hackers. The hackers stole corporate passwords of each and every employee and spied on more than 50 individuals in a time span of 4 months. Apparently these attacks...

As another Java flaw is discovered, is it time to disable Java completely?

 January 17, 2013

Estimated reading time: 3 minutes

After a massive Java 0-day vulnerability surfaced in August 2012, Oracle released an out-of-cycle update to combat the exploit. However, we advised our readers to simply disable Java on their web browsers to avoid the threat. Java has now become a highly vulnerable program that causes more trouble than it...

Microsoft releases a Fix it solution to prevent Internet Explorer hijacking vulnerability

 January 3, 2013

Estimated reading time: 2 minutes

Microsoft has successfully released a ‘Fix it solution’ for the recently discovered targeted attack, CVE-2012-4792. This attack was specifically targeted at users of Internet Explorer versions 6, 7 and 8. Users of Internet Explorer 9 and 10 were not affected. The attack exploited a vulnerability that allowed an attacker to...

Google Play Store may soon get a built-in malware scanner

 October 15, 2012

Estimated reading time: 2 minutes

Google intends to release a future update to its Google Play Store that will provide client-side protection from malware present in malicious applications. This malware scanner will analyze an application when a user attempts to install it on an Android device. If there is a known strain of malware present...