Blog

May 2016

Quick Heal Threat Research Lab has recently observed an active cybercrime campaign designed to steal user info. The campaign has been noticed to make use of three keyloggers (malicious software that records information entered by a user on their computer keyboard) iSpy logger, Predator logger and Knight Logger. These software...
If you haven’t yet heard of the ‘WhatsApp Gold’ app, you soon will. And we are here to tell you that, this is yet another scam planned by cyber crooks. Users of popular messaging app WhatsApp, are reporting about receiving a message that advertises a newly launched app called WhatsApp...
Last week, popular business social networking site LinkedIn announced that over 100 million user passwords were compromised. This was followed by a strong advisory to users about changing their passwords. A brief flashback >> A few years ago, in 2012, LinkedIn was hit by a major hack that caused a...
Almost every computer user has more than one account for social networking sites, email accounts, bank accounts, online shopping portals, etc. And for obvious reasons, it becomes difficult for them to remember their login credentials, and this gives away to a habit of saving username and passwords in web browsers,...
Our readers would be glad to know that the new and enhanced version of the Quick Heal product series is here! Based on the various feedback and suggestions received from our users across the world, we have brought in some major enhancements to this year’s product line and also introduced...
Ramnit was introduced as a worm into the cyber world during the end of 2010. In these few years, researchers at Quick heal Labs have observed a drastic change in the components of this malware. Malware authors of this family are continuously upgrading to adapt to the changing needs of...
Earlier, malware authors kept their payloads on Command and Control (C&C) servers or compromised websites. And to do this, they had to setup their C&C server or compromise a genuine website. But now, they don’t need to bother about such things, as they have started using genuine file sharing sites...
Here’s a light, crisp refresher on 7 good computer security habits for you all. #1st Tip Lock your PC when you are away This is a no-brainer; yet, most of us may conveniently forget to do so. And we don’t realize its importance until some miscreant gets their hands on...
world password day
UPDATE – May 5th, 2016 Achieving cyber security is getting harder every year, and the most critical aspect of this process is passwords. With so many different passwords to remember for every individual, there are several loopholes which need to be secured. Have a look at the infographic below to...