Threats to your digital life are increasing. Are you doing anything about it?

Credit to Author: Rajiv Singha| Date: Wed, 08 Aug 2018 05:48:41 +0000

It’s an exciting age to be alive! We are rapidly advancing towards greater heights of technology paying witness to inventions like the Internet of Things (IoT), Artificial Intelligence, Flying Cars, and the prospect of traveling to space as an excursion! The word ‘exciting’ fails to define these milestones mankind is…

Read more

[INFOGRAPHIC] 5 Myths about mobile security and facts that debunk them

Credit to Author: Rajiv Singha| Date: Thu, 31 May 2018 08:45:31 +0000

When it comes to desktop computers, people go for the best security software. But when the talk is about their mobile security, odds are, they are least bothered. Most think that their mobile devices are less vulnerable to cyberattacks than their computers; that however, is a myth, and probably a…

Read more

How important are security patches and updates

Credit to Author: Quick Heal Security Labs| Date: Mon, 23 Apr 2018 05:32:44 +0000

Security vulnerabilities are increasing and just not so long before, we had to deal with so many of them. Remember WannaCry? In this post, we will discuss some important case in points with respect to security vulnerabilities and how important are security patches and updates. The WannaCry scare The biggest…

Read more

INFOGRAPHIC: Quick Heal Annual Threat Report 2018 | Key Findings

Credit to Author: Rajib Singha| Date: Mon, 19 Feb 2018 12:46:37 +0000

The Quick Heal Annual Threat Report 2018 is up and it puts together information that concerns individuals and business owners alike. It gives an insight into how the cybersecurity landscape shaped up in 2017 and how it is going to be in 2018. This infographic presents a quick overview of…

Read more

A massive security flaw discovered in Skype. Fix not coming anytime soon.

Credit to Author: Shriram Munde| Date: Wed, 14 Feb 2018 09:10:30 +0000

Quick Heal Security Labs has recently learned about a serious vulnerability in Skype’s update installer – that’s the bad news. The worse news is, Microsoft is not going to patch the vulnerability anytime soon as this would require the updater to go through a ‘large code revision’. What is this…

Read more

Vulnerabilities found in Broadcom Wi-Fi adapter of Lenovo laptop chipsets

Credit to Author: Shriram Munde| Date: Tue, 13 Feb 2018 12:07:22 +0000

Vulnerabilities found in Broadcom Wi-Fi adapter of Lenovo laptop chipsets Lenovo recently released an advisory, warning customers about two critical Broadcom vulnerabilities which impact 25 models of its popular ThinkPad lineup. The Broadcom Wi-Fi chipsets used by Lenovo ThinkPad devices are affected by the CVE-2017-11120 & CVE-2017-11121 vulnerabilities. Both these issues…

Read more

Malspam campaigns exploiting recent MS Office vulnerability ‘CVE-2017-11882’ – An Analysis by Quick Heal Security Labs

Credit to Author: Aniruddha Dolas| Date: Mon, 05 Feb 2018 10:12:34 +0000

No wonder malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns making use of MS Office malware such as malicious macro, CVE-2017-0199, CVE-2017-8759 and DDE-based attack. Recently, we have started observing various malspam campaigns exploiting the latest MS Office vulnerability CVE-2018-11882. Let’s take a look…

Read more

Malspam campaigns exploiting recent MS Office vulnerability ‘CVE-2017-11882’

Credit to Author: Aniruddha Dolas| Date: Mon, 05 Feb 2018 10:12:34 +0000

No wonder malspam campaigns are a major medium to spread malware. Previously, we have written about such campaigns making use of MS Office malware such as malicious macro CVE-2017-0199, CVE-2017-8759 and DDE-based attack. Recently, we have started observing various malspam campaigns exploiting the latest MS Office vulnerability CVE-2018-11882. Let’s take a…

Read more

What do we need to know about the CPU exploits Meltdown and Spectre?

Credit to Author: Quick Heal Security Labs| Date: Thu, 04 Jan 2018 13:02:09 +0000

What exactly is a vulnerability? A security vulnerability (also known as a security hole) is a security flaw detected in a product that may leave it open to hackers and malware. Using such vulnerabilities, attackers can exploit the affected system/product for their profit in various ways. What is an exploit? Exploits…

Read more

What do we need to know about the CPU vulnerabilities Meltdown and Spectre?

Credit to Author: Quick Heal Security Labs| Date: Thu, 04 Jan 2018 13:02:09 +0000

What exactly is a vulnerability? A security vulnerability (also known as a security hole) is a security flaw detected in a product that may leave it open to hackers and malware. Using such vulnerabilities, attackers can exploit the affected system/product for their profit in various ways. What is an exploit? Exploits…

Read more