The different types of malware seen in the wild

We repeatedly speak about the different techniques that attackers use to infect machines with malware. We also provide precautions that users can take to protect themselves from malware and phishing threats. In this post we will highlight the different strains of malware that are seen in the wild and what dangers they pose. Though most […]

Microsoft disrupts major botnet by blocking malicious domain

Microsoft recently won a court order to host “3322.org”, a nefarious Internet domain based in China, with its own dynamic DNS. The malicious domain hosts around 70,000 malicious subdomains and generates close to 500 different strains of malware that are distributed via counterfeit software. One of the most infamous botnets to originate from this source […]

How to avoid the latest Java 0-day vulnerability

Java application software has always been extremely vulnerable due to its cross-platform nature. Exploits developed for this software platform can be used to affect various computer systems across diverse computing environments. Now, a new 0-day vulnerability is being exploited by attackers and this is causing mayhem across the computer security world. What is the vulnerability? […]

Quick Heal 2013 and Sandboxing ensure comprehensive protection

The advent of Web 2.0, social engineering and widespread Browser Exploit Packs (BEP) has led to the rise of a large amount of threats while browsing the Internet. When one surfs the web and types an address in the URL bar, the website appears. Potentially, it can bring many unwanted threats embedded in its HTML […]

Gauss Malware – Updated version of Stuxnet

Gauss is a highly complex and sophisticated online banking malware that belongs to the same family as Flame, Duqu and Stuxnet. Gauss seems to be updated version of Stuxnet malware. Similar characteristics of these malwares are as follows: Use encryption method (XOR) Command and control (C&C) servers Use .LNK exploit vulnerability Use USB as storage […]

Round-up of Security news updates from the last week

IMs reach third-party contacts thanks to Skype bug A mysterious Skype bug sent messages (IMs) exchanged between two users, to random third-parties on either users’ list. Skype claims this occurred due to old versions of their app crashing on several platforms. This resulted in a lot of bad publicity for the service that was once […]

Windows 8 security features that Quick Heal users will love

Windows 8 is scheduled to hit the market in October and promises a new era for desktops. Microsoft aims to integrate the PC market with the mobile market by unifying the Metro UI across all platforms. However, Windows has always brought a number of security threats due to its massive popularity. Windows 8 shall be […]