Fake Facebook alert for changing their password

 December 22, 2011

Estimated reading time: 1 minute

Facebook users are being targeted with fake emails pertaining to come from the social network and alerting them to change their password. The emails are sent from the spoofed email address “Facebook (update+{Random Characters} with subjects like: -Security alert. -Your account information. -New notifications. The email comes with one of...

25 Worst Passwords of 2011

 November 27, 2011

Estimated reading time: 1 minute

A password is a secret word or a string of characters that is used for authentication, to prove identity or to gain access to one’s laptop, Facebook, Gmail, LinkedIn and many more similar accounts. Choosing “password” as your online password is not a good idea. In fact, it’s the worst...

Phone Text Message Lottery Scam

 November 23, 2011

Estimated reading time: 2 minutes

It is seen that Advance-Fee Fraud i.e. a confidence trick to earn money is being used by scammers sending phone text (SMS) messages as a means of tricking new victims. These text messages claim that the recipient has won a substantial sum of money in an online lottery as shown...

New Google search bots are smarter, are they smart enough to avoid misuse?

 November 3, 2011

Estimated reading time: 1 minute

Google seems to have recently updated its Google Search services. Among the many new features, the one that is most important from the point of view of a malicious user, is its capability to read through user comments. Googlebots are now capable of reading dynamic comments on websites posted by...

Facebook Scam – Play Mario Kart Game

 November 3, 2011

Estimated reading time: 2 minutes

A new Facebook Scam – “Play Mario Kart Game”, tries to deceive a viewer that anyone can play the Mario Kart game on Facebook. The scam says – “Play Mario Kart on Facebook with your Friends! Join the multiplayer mayhem NOW! Click here to play”. When a viewer clicks the...

Surfing the Internet the secure way with browser sandbox

  • 1
 November 1, 2011

Estimated reading time: 2 minutes

PC’s today are mostly victims of infections caused by visiting infected websites that drop malware codes. Even though we have website reputation checks implemented by all anti-malware software, there is always a slight chance that the user may visit a newly infected website that has not yet been classified as...

Microsoft October2011 Patch Tuesday Released

 October 12, 2011

Estimated reading time: 4 minutes

Microsoft has released 8 security bulletins covering a total of 23 vulnerabilities for software such as Microsoft .NET Framework, Microsoft Silverlight, Internet Explorer, Microsoft Forefront United Access Gateway and Microsoft Host Integration Server. 6 out of the 8 bulletins are rated ‘Important’, while 2 are rated ‘Critical’. Some of the...

Quick Heal releases 2012 product series

 September 28, 2011

Estimated reading time: 1 minute

We are glad to announce that we have released the Quick Heal 2012 Product Series. Quick Heal 2012 Products are now available across all segments – home users, small-medium companies and for the corporate sector as well. Registered users possessing Quick Heal 2011, 2010 or 2009 can upgrade to Quick...

Microsoft September2011 Patch Tuesday Released

 September 15, 2011

Estimated reading time: 3 minutes

Microsoft has released 5 security bulletins covering a total of 15 vulnerabilities. All of these vulnerabilities are rated ‘Important’ by Microsoft, even though three of them could lead to remote code execution. The patches address elevation of privileged and remote code execution vulnerabilities and may require a restart of Windows....


 September 2, 2011

Estimated reading time: 2 minutes

Today we received the following email: ************************************************************** From: “Squirrel Mail Development Team” Subject: UPDATE YOUR E-MAIL SECURITY IMMEDIATELY (IUEU) Date: Thu, 1 Sep 2011 19:14:23 +0700 X-Mailer: Microsoft Outlook Express 6.00.2600.0000 X-EMLSPAM: 0 X-EMLSPAM-SCORE: -100 Dear E-Mail User Due to the package compromise of 1.4.11,1.4.12 and 1.4.13, we are forced...