# Tags

The growing threat of mobile malware: Top Android malware families of 2012

The open-source nature of the Android platform is its biggest strength and Achilles heel at the same time. Android handsets constituted almost 72% of global smartphone sales in Q3 2012 and 1.3 million Android devices are activated worldwide every single day. This is a staggering market share that Android enjoys but this brings with it […]

Microsoft releases a Fix it solution to prevent Internet Explorer hijacking vulnerability

Microsoft has successfully released a ‘Fix it solution’ for the recently discovered targeted attack, CVE-2012-4792. This attack was specifically targeted at users of Internet Explorer versions 6, 7 and 8. Users of Internet Explorer 9 and 10 were not affected. The attack exploited a vulnerability that allowed an attacker to literally hijack a PC and […]

Top 10 Quick Heal security blogs for 2012

2012 has been an eventful year for malware and security threats. A number of innovative social engineering tricks, malwares and threats reared their ugly heads and caused losses all around the world. We witnessed all kinds of attacks by hackers and posted a number of findings on our blog. Here are the top 10 blog […]

Season’s greetings: Beware of security threats and fake phishing pages

The festive season brings with it heart warming wishes and some great online deals for shoppers and discount seekers. Online retailers present some great discounts and add-ons at this time of the year and online sales see a massive surge in activity as a result. Unsurprisingly, attackers and phishers use this jubilant opportunity to trick […]

Security news and updates from the last week

Major security flaw found in Samsung devices, Samsung working on solution Samsung manufactures the Exynos 4 quad-core and dual-core chips for its flagship products like Samsung Galaxy S3 and the Galaxy Note II. However, a security flaw has been discovered in these SoC (system on a chip) processors that makes the devices vulnerable to remote […]

Germans demand anonymous accounts over Facebook: Wise move or not?

German legislators have stoked the fires of Facebook privacy by ordering the social network to allow anonymous accounts and pseudonyms in place of real names of people. This demand originated from Schleswig-Holstein, the northernmost state of Germany. A data protection agency called Unabhaengiges Landeszentrum fuer Datenschutz (ULD) has emphasized the German decree that guarantees the […]

Future Watch VII: Your Smart TV opens up a new frontier for hacks and spying

Just like smartphones arrived in most markets and obliterated regular feature phones, smart TV’s are expected to change the way we interact with our television sets. A smart TV, or hybrid TV, comes integrated with several web 2.0 applications and widgets that allow users to access the Internet and obtain content from several sources. However […]

Security news updates from the week gone by

Bangalore biggest target of cyber crimes in 2012 The cyber criminal cell at the Criminal Investigation Department (CID) has reported that out of all Indian cities, Bangalore faced the most number of cyber crimes in 2012. Close to 400 reported incidents have been witnessed till the end of November in the state of Karnataka. Udupi […]

Simple security tips to avoid Twitter phishing scams

Twitter is a great platform for sharing news, opinions and links. Created in 2006, Twitter has more than 500 million active users today and generates more than 350 million tweets every single day. This has naturally led to several phishing attacks over the microblogging platform. The fact that links are instantly published on a large […]

How does a hacker crack encrypted password databases?

We recently published a post about the inherent dangers of passwords and how they are increasingly vulnerable thanks to user negligence. With so much data being safeguarded by elemental passwords, the need for a refined security layer is imperative. However, a common question we received was about how attackers actually store and share compromised passwords […]