Blog

Security

The Latest Security News and Updates from this Week

 June 22, 2013

Estimated reading time: 2 minutes

With another week wrapping up, let’s quickly leaf through the latest news and updates from the security community. Pirate Bay Co-Founder Sentenced to Two Years in Prison Gottfrid Svartholm Warg, 28, co-founder of the popular torrent site “The Pirate Bay”, is to serve two years in jail. He was found...

Adobe addresses serious vulnerabilities with its latest patches

 April 10, 2013

Estimated reading time: 1 minute

Adobe Systems has released improved versions of Flash Player, Shockwave Player and ColdFusion to patch critical vulnerabilities in these. As stated by Adobe “these vulnerabilities could cause a crash and potentially allow an attacker to take control of the affected system” The new versions of Flash Player for Windows and...

Instagram: What you need to know – Part 2

 April 6, 2013

Estimated reading time: 4 minutes

This post is in continuation with our previous post on Instagram and will discuss how you can control your privacy in the app. In Instagram the key word is ‘public.’ Once an Instagram profile has been created, anyone can browse these online profiles and “follow” other Instagram users. Here comes the...

Instagram: What you need to know

 April 3, 2013

Estimated reading time: 3 minutes

In an earlier post we talked about various apps and the risks associated with them. In these subsequent posts, we will scratch the surface a little bit and dig a little deeper to understand the privacy implications of one app in particular – Instagram. Now, that our very own Big...

Latest security news updates from the week gone by

 March 2, 2013

Estimated reading time: 1 minute

Personal information of app users leaked on Google Play People who still disregard Android security and do not take privacy controls over the platform seriously, will be alarmed to learn this piece of news. An Australian app developer recently discovered that he had complete access to personal information of the...

Why USB drives and CDs are a security risk to your corporate network

 February 26, 2013

Estimated reading time: 3 minutes

It is common knowledge that business organizations need to make significant investments to safeguard their data. This involves protecting the corporate network from external threats and internal parties (employees) as well. This is where effective Endpoint Security (EPS) comes into the picture. EPS is a network security concept that places...

Future Watch VII: War-texting threatens the future of Internet of things

 February 25, 2013

Estimated reading time: 3 minutes

At Quick Heal, we persistently look out for potential security threats that can lead to data breaches in the future. The rise of the ‘Internet of Things’ and omnipresent wireless connectivity for miscellaneous items is slowly opening up new attack avenues for hackers. A new kind of hacking attack has...

Latest Mac malware on the rise, hides in networked printer directory

 February 20, 2013

Estimated reading time: 2 minutes

A new variant of Mac malware has been discovered and it is beginning to spread to Apple Macs through the networked printer file directory. The malware is a kind of ‘Backdoor Trojan’ and some sources have named this Trojan ‘Pintsized’. Apple Mac OS X is afflicted by this malware but...

Web security basics: Watering hole attacks VS phishing attacks

 February 19, 2013

Estimated reading time: 3 minutes

Computer users who are well versed with security threats know why and how clever phishing pages must be avoided. Clear signs help to identify fake phishing pages but what does one do against a “watering hole attack”? What exactly is a watering hole attack? A watering hole attack is a...