A few salient features every Quick Heal user should know

Users of Quick Heal security products and readers of this blog are well aware of the exclusive features we offer our valued customers. We would like to highlight some ownership benefits that are unique to Quick Heal and prove how much we cherish our users. Here are some advantages of using Quick Heal products and […]

‘Flamer’ Lights Fire In Cyber Space

We would like to update our readers about the findings of Flamer, the recent information stealing malware which is making news in Cyber Space. Investigation shows that a few of the malicious Flamer components were reported in the Online Scanner portal around 2 years and 10 months ago (in August 2009). Shown below are the […]

New cyber espionage malware ‘Flamer’ is the most complex ever seen

Our Malware Analysis team has discovered a highly complex malware (Trojan.Flamer.A) that is written using the ‘Lua’ programming language. This malware is on par, if not stronger, than previously seen similar threats, Stuxnet and Duqu. The Iranian CERT (Computer Emergency Response Team) has many names for this worm – ‘Flame’, ‘Flamer’, ‘Skywiper’ or ‘Viper’. They […]

Anonymous readying to stage Occupy India protests across all major cities on 9 June

Anonymous, the faceless worldwide hacktivist group, is staging a series of protests in India on June 9 as part of the ‘Occupy India’ movement. These protests are in response to the blocking of popular file sharing websites like ‘The Pirate Bay’ and video sharing websites like ‘Vimeo’ by ISPs in the country (here is the […]

Facebook planning to allow under-13s: Is this a good decision?

Simon Milner, Head of Policy in Facebook, Britain, recently declared that Facebook is planning to abolish the act of disallowing children below 13 years of age from becoming members (this CNET post explains the situation well). The opinions obviously are divided straight down the middle. Many parents feel that this age limit is necessary as […]

Infographic: Quick Heal’s DNAScan Technology

As the proliferation of the Internet and the use and abuse of Web 2.0 increases, computer users are exposed to zero-day threats and risks that propagate in real-time. Any access to the Internet without protection is no doubt clogged with spyware, adware and dangerous bots. It doesn’t stop at this, the situation gets trickier even […]

Thinking of rooting your precious Droid? Here’s why it may not be such a good idea

The massive popularity of Android smartphones has brought several features and options of the OS to the public domain. One of these options remains the ability to ‘root’ the device. Rooting an Android phone implies gaining (superuser) access to the kernel code of the software and using this access to improve performance and enjoy/replace several […]

Infographic: The myth about smartphone invulnerability

Contrary to popular belief, the user-programmable miniature yet powerful mobile devices used for carrying data, sending e-mails, social networking, banking, gaming, downloading music and video aided with the rampant use of third party software, are not invincible. There are increasing problems from applications that upload malware or exploit vulnerabilities in new operating systems, either inadvertently […]

A few tricks to avoid the ‘Phishing’ trap

Phishing is a technique that scammers use to obtain personal information by posing to be from a legitimate source. As a result, there are many people who fall for phishing emails. We regularly update this blog with details about fraudulent emails that attempt to phish for information, but now we would like to tell readers […]