Web security basics: Watering hole attacks VS phishing attacks

Computer users who are well versed with security threats know why and how clever phishing pages must be avoided. Clear signs help to identify fake phishing pages but what does one do against a “watering hole attack”? What exactly is a watering hole attack? A watering hole attack is a technique whereby users are profiled […]

Security news and updates from the last week

India – Where most of the world’s spam originates from A large amount of email spam originates in India. This interesting report shows that most of the world’s spam actually originates in India. Facebook has more than 50 million duplicate user accounts worldwide Facebook officials have claimed that there are currently 50 million duplicate accounts […]

Malware Alert! The risk of image searches on Google and Bing

When was the last time you carried out an image search on Google Images? Did you check the website the image was hosted on before you downloaded it on your computer or smartphone? Unknown to you, image searches are one of the biggest channels of malware over the Internet. Security conscious Internet users regularly take […]

Quick Heal proudly launches Total Security for Mac for Apple users

Quick Heal is proud to announce its latest security solution – Quick Heal Total Security for Mac. Designed for the world’s most advanced operating system, Apple Mac OS X, Quick Heal Total Security for Mac is an intelligent security solution that provides advanced protection features without slowing down the performance of an Apple Mac. Considered […]

More than Rs. 30 crore skimmed off Indian credit card users over 2 months

Over the last few days it has come to light that a global syndicate has been skimming Indian credit card users for the last 2 months. Several cases have been reported where people’s credit card bills and registered mobile numbers have shown fraudulent and unauthorized transactions. It is believed that the total unauthorized transactions so […]

The first computer virus was designed for an Apple computer, by a 15 year old

Contrary to popular belief, the first widespread computer virus that actively spread ‘in-the-wild’ was designed to target Apple computers. This might surprise some staunch Apple users who still feel that their Macs are completely invincible and cannot be infected with any kind of malware whatsoever. In this post we will discuss the Elk Cloner virus, […]

Security news and updates from the last week

New York Times website breached by Chinese hackers The New York Times recently discovered that their computer systems were breached by Chinese hackers. The hackers stole corporate passwords of each and every employee and spied on more than 50 individuals in a time span of 4 months. Apparently these attacks started when the Times started […]

A history of Mac malware: The Apple of a virus developer’s eye

Apple Macs are falsely believed to be invincible and completely safe against malware threats and security breaches. But as we recently discussed, this perpetual myth has gradually been broken over the years. Apple has subtly acknowledged this fact over the last year or so and has made major upheavals in their marketing strategies as a […]

Facebook Graph Search: Useful search engine or phishers dream come true?

Facebook recently launched a notable new feature known as Graph Search. Mark Zuckerberg highlighted this feature as one of the 3 pillars of Facebook (after Newsfeed and Timeline) that make the social network relevant and personalized. But how safe is Graph Search? We feel that there are several security and privacy concerns that accompany this […]

Manhattan Court charges creators of Gozi, the world’s most destructive financial virus

In a landmark development for the cyber security world, three cyber criminals have been charged in a Federal Manhattan Court in New York for stealing ‘tens of millions of dollars’ from online banking customers. The hackers were guilty of running Gozi, one of the most advanced and financially destructive viruses ever seen in the world. […]