The different types of malware seen in the wild

We repeatedly speak about the different techniques that attackers use to infect machines with malware. We also provide…

Microsoft disrupts major botnet by blocking malicious domain

Microsoft recently won a court order to host “3322.org”, a nefarious Internet domain based in China, with its…

How to avoid the latest Java 0-day vulnerability

Java application software has always been extremely vulnerable due to its cross-platform nature. Exploits developed for this software…

Quick Heal 2013 and Sandboxing ensure comprehensive protection

The advent of Web 2.0, social engineering and widespread Browser Exploit Packs (BEP) has led to the rise…

How to activate two-factor authentication for Gmail

Mat Honan, a tech journalist for Wired, recently witnessed an epic hacking of his Apple account, Amazon account,…

Gauss Malware – Updated version of Stuxnet

Gauss is a highly complex and sophisticated online banking malware that belongs to the same family as Flame,…

Future Watch V: NFC and Shopping apps security risks

Imagine a scenario where a customer walks into a supermarket to buy groceries. She receives a greeting and…

Round-up of Security news updates from the last week

IMs reach third-party contacts thanks to Skype bug A mysterious Skype bug sent messages (IMs) exchanged between two…

Windows 8 security features that Quick Heal users will love

Windows 8 is scheduled to hit the market in October and promises a new era for desktops. Microsoft…

The savoir faire of safe mobile banking

The convenience and fluidity of access that mobile devices promise makes them one of the most sought after…