Blog
Quick heal blog
  • 27
    Shares
 April 16, 2018

Estimated reading time: 3 minutes

A new variant of the Dharma ransomware (‘.arrow’) has been observed in the wild. This variant appends the extension ‘.arrow’ to the files it encrypts and spreads via spam emails.   How Dharma encrypts its victim’s files Once executed, the ‘.arrow’ variant of Dharma uses the below command to disable...
  • 59
    Shares
 April 12, 2018

Estimated reading time: 2 minutes

Spyware refers to software that spy on your Internet browsing activities, record keystrokes, and collect almost any type of data including your personal information such as credit/debit card or banking details, login IDs and passwords. In this post, we share 8 tips to avoid a spyware attack and keep your...
  • 51
    Shares
 April 5, 2018

Estimated reading time: 3 minutes

One of the oldest, nastiest and most lucrative tools used by hackers is phishing – a method to fool you into revealing your personal and sensitive information such as debit/card numbers, passwords, ATM pin, date of birth – any data that can personal identify you. Here’s an example of a...
  • 57
    Shares
 March 27, 2018
9_safety_tips_for_making_secure_mobile_transactions

Estimated reading time: 2 minutes

Do you find it convenient to shop and bank online using mobile payment apps? Most would have ‘yes’ as an answer. But, are we letting ‘convenience’ overshadow ‘security’? An attacker can easily get hold of your personal and banking information if the app or the mobile site you are using...
  • 67
    Shares
 March 20, 2018

Estimated reading time: 4 minutes

WhatsApp currently has over 200 million monthly active users in India. No wonder it has become a popular tool for scammers. Just last night, I received the following message from one of my friends on WhatsApp. Fig 1 The message is in Hindi and loosely translates to this… Open this...
 March 19, 2018

Estimated reading time: 4 minutes

Quick Heal Security Labs has come across a new ransomware that goes by the name ‘Zenis’. The ransomware not only encrypts files but also intentionally deletes the infected system’s backup.   The behavior of Zenis ransomware Upon inside a computer, the ransomware performs the following checks before it starts encrypting...
  • 55
    Shares
 March 15, 2018

Estimated reading time: 8 minutes

Whether you are a normal user or a tech-guru, being aware of the computer security threats will help fortify your defense against them. So, here’s a handy A-Z dictionary of cybersecurity terms.