Surfing the Internet the secure way with browser sandbox

PC’s today are mostly victims of infections caused by visiting infected websites that drop malware codes. Even though we have website reputation checks implemented by all anti-malware software, there is always a slight chance that the user may visit a newly infected website that has not yet been classified as ‘infected’ in the reputation database. […]

Microsoft October2011 Patch Tuesday Released

Microsoft has released 8 security bulletins covering a total of 23 vulnerabilities for software such as Microsoft .NET Framework, Microsoft Silverlight, Internet Explorer, Microsoft Forefront United Access Gateway and Microsoft Host Integration Server. 6 out of the 8 bulletins are rated ‘Important’, while 2 are rated ‘Critical’. Some of the patches indicated a required restart […]

Quick Heal releases 2012 product series

We are glad to announce that we have released the Quick Heal 2012 Product Series. Quick Heal 2012 Products are now available across all segments – home users, small-medium companies and for the corporate sector as well. Registered users possessing Quick Heal 2011, 2010 or 2009 can upgrade to Quick Heal 2012 by visiting: https://www.quickheal.co.in/upg2012.asp […]

Microsoft September2011 Patch Tuesday Released

Microsoft has released 5 security bulletins covering a total of 15 vulnerabilities. All of these vulnerabilities are rated ‘Important’ by Microsoft, even though three of them could lead to remote code execution. The patches address elevation of privileged and remote code execution vulnerabilities and may require a restart of Windows. Two of the bulletins address […]

UPDATE YOUR E-MAIL SECURITY IMMEDIATELY (IUEU) SCAM!

Today we received the following email: ************************************************************** From: “Squirrel Mail Development Team” Subject: UPDATE YOUR E-MAIL SECURITY IMMEDIATELY (IUEU) Date: Thu, 1 Sep 2011 19:14:23 +0700 X-Mailer: Microsoft Outlook Express 6.00.2600.0000 X-EMLSPAM: 0 X-EMLSPAM-SCORE: -100 Dear E-Mail User Due to the package compromise of 1.4.11,1.4.12 and 1.4.13, we are forced to release 1.4.15 to ensure […]

Worm Morto Spreading via RDP

Our research team came across a Worm file, which upon execution wriggles its way through the systems using the RDP port. This worm is known as Morto and it is spreading very quickly in the wild. Morto uses the RDP (Remote Desktop protocol) to connect to a remote system and tries scanning the RDP port […]

Adobe Security Updates released

Adobe have released Bulletins and Advisories for the below products: Adobe Shockwave Player Affected software versions Shockwave Player11.6.0.626 and earlier versions for Windows and Macintosh https://www.adobe.com/support/security/bulletins/apsb11-19.html Adobe Flash Media Server Affected software versions Flash Media Server 4.0.2 and earlier versions for Windows and Linux Flash Media Server 3.5.6 and earlier versions for Windows and Linux […]

“TrojanBanker.Activator.a” Fake Windows Activation

A new infection has been spreading on the Internet targeting Windows users. In fact, it is a Trojan horse that pretends to be a Windows Activation program. Once infected, you will receive a professional looking screen simulating Microsoft Windows Activation which will state that you need to re-activate your Windows OS. The program will also […]

Quick Heal Mobile Security for Android based mobile devices launched

Today is the official launch for Quick Heal Mobile Security for Android smartphones and tablets. The Quick Heal team is proud of entering the new and amazing world of Android. Thank you for the overwhelming response to the pre-launch registration offer. With 5,000+ registrations on the first day of the pre-launch, Quick Heal Mobile Security […]

“System process at address 0x3BC3 have just crashed” Ransomware

“System process at address 0x3BC3 have just crashed, please follow these steps to deactivate it from your system.” This is a fraudulent system error warning that alerts users of an erroneous system risk and then prompts users to call the premium-rate phone number mentioned to resolve the apparent issue. This ransomware is distributed through the […]