Blog

SSL certificate

Superfish 2.0 – Dell Laptops Preinstalled with Similar Malware and Security Flaw

 November 26, 2015
Superfish 2.0 on Dell

Estimated reading time: 2 minutes

Earlier this year, several cases came to light where brand new Lenovo laptops came preinstalled with a strain of adware that was being used by hackers to steal sensitive data. This adware was known as ‘Superfish’ and it affected thousands of PC users around the world. The Superfish adware effectively...

Logjam Vulnerability: Why You Need to Upgrade Your Browsers

 May 21, 2015

Estimated reading time: 2 minutes

Another new SSL (Secure Sockets Layer) vulnerability has come to light in the last few hours and your home computers and office workstations could be at risk. If you are familiar with the Heartbleed and FREAK attacks from the last few months, then you would know that such kind of...

Lenovo Users – This is how you can remove the Superfish Adware

 February 24, 2015

Estimated reading time: 3 minutes

In case you are unaware, Lenovo has been shipping some of its consumer notebooks with a  preinstalled adware called Superfish. This software makes it possible for hackers to steal sensitive user data like passwords, banking information, etc. Scroll down to know more about this adware and how to remove it...

Aftereffects of Heartbleed: Have You Changed these Passwords?

 April 25, 2014

Estimated reading time: 2 minutes

Last week we wrote a blog about Heartbleed, the latest security bug that turned up around the world and caused global mayhem. The bug targeted the SSL encryption of web services that used OpenSSL, and this meant pretty much every major web service was affected. Moreover, security researchers subsequently found...

3 Important Things You Should Know About Heartbleed

 April 14, 2014

Estimated reading time: 3 minutes

Password leaks and targeted attacks are nothing new and the latest security bug related to a massive loss of passwords across the world is ‘Heartbleed’. This bug has received a lot of media coverage over the last few days, so there is a lot of confusion about what it is...

Scammers steal credit card details in ways you never thought of

 October 27, 2012

Estimated reading time: 3 minutes

Cyber criminals and malicious scammers are constantly at work to devise new ways to steal confidential user data. Unfortunately, such attacks are not just restricted to the Internet. A recently discovered spate of attacks enables scammers to steal credit/debit card details and these methods are increasingly carried out in the...

Vulnerable Wi-Fi routers lead to attacks and fake websites

 October 19, 2012

Estimated reading time: 2 minutes

It was recently discovered that millions of ADSL routers were hacked in Brazil to create a large botnet chain. This is an unprecedented move that goes to show that not even our routers are safe from attackers. Many homes and offices use Wi-Fi routers for web access today so it...

Quick Heal 2013 offers domain and sub-domain control for HTTPS sites

 August 28, 2012

Estimated reading time: 2 minutes

HTTPS protocols are utilized by many websites over the Internet today. This secure layer offers protection against man-in-the-middle attacks and phishing exploits. It also helps a user to detect fake websites that ask for personal information. Traditionally, domains that ask for credit/debit card details and login passwords commonly use this....

FAQs on SSL certificates and their importance

 August 7, 2012

Estimated reading time: 3 minutes

While browsing the web a user frequently comes across several pages where a secure channel of communication is required. This is especially true since many attackers have staged phishing attacks and stolen confidential information over the years. Pages that involve financial transactions, login details and other data are hence secured...

Future Watch II: Rogue SSL certificates on the rise

 June 4, 2012

Estimated reading time: 2 minutes

Continuing with our series of predicting potential security threats, this post delves into rogue SSL certificates. This attack vector allows phishers and social engineers to gain complete trust of their victims, the prospects of which are quite frightening. SSL (Secure Socket Layer) certificates are present on pages where a user...