Blog

June 2016

  • 39
    Shares
0

Estimated reading time: 4 minutes

Social Media day was launched by the popular website Mashable back in 2010 on June 30th. For obvious reasons, this day recognizes the impact social media has had and is having on global communication and the Internet community as a whole. And we thought what could be better to celebrate...
  • 134
    Shares
1 Comment
ATM_Skimming

Estimated reading time: 2 minutes

It so happens that a vacation taken by a cyber security expert turns out to be yet another eye-opener for many. While holidaying in Vienna, Austria, cyber security expert Benjamin Tedesco comes across a well-camouflaged ATM skimming machine. Before we continue, let us tell you a little about what is...
1 Comment

Estimated reading time: 1 minute

Kovter Trojan has been in effect since 2013. Being fileless, Kovter is different and stealthier than other Trojan families. It employs various anti-debugging, anti-VM, anti-sandboxing techniques, and has checks for identification of different security analysis tools. It uses different encryption techniques for different purposes. Like other Trojans, Kovter gathers user...
  • 52
    Shares
12

Estimated reading time: 3 minutes

If anything, cybercriminals are an ambitious lot. They keep themselves busy in devising new methods to scam the Internet population. And malvertising is just one of their nefarious tricks. In this post, we will help you understand what is malvertising, how it works, and how you can protect yourself from...
  • 26
    Shares
5

Estimated reading time: 3 minutes

Is your smartphone not as zappy as it used to be when you bought it? If yes, then you can blame low memory space for this. When your phone runs out of memory, it refuses to take any more pics or videos, install updates or run smoothly – all obvious...
  • 65
    Shares
7
Phishing emails contain ransomware

Estimated reading time: 2 minutes

If you thought phishing emails are less dangerous, then you would be terribly wrong. According to a recent report, almost 93% of phishing emails now carry the ransomware malware. First, what is phishing? Phishing is an age-old trick used by scammers and hackers to trick people into revealing their personal...
0

Estimated reading time: 2 minutes

Cyber espionage campaigns are not only common with government and military organizations, but they also take private firms into their inferno. More often not, the perpetrators are business rivals or disgruntled employees. At Quick Heal, we have observed a targeted attack on an online marketing firm (name withheld to protect...
  • 36
    Shares
0
smartphone security

Estimated reading time: 2 minutes

Just like the private sector, the Government has been encouraging its employees to use smartphones for better collaboration within departments. This rapid adoption of smartphones and Internet services in Government organizations might lead to situations where national security could be compromised by a simple data breach. This is a concern...
  • 26
    Shares
0

Estimated reading time: 1 minute

The Quick Heal Malware Intelligence Reporting System has made a recent observation about a CVE (Common Vulnerabilities and Exposures) known as CVE-2015-2545 being actively used in an online spam campaign. The campaign begins with targeted users receiving a spam email with an attached malicious document. Below are some common attachment...
  • 44
    Shares
2

Estimated reading time: 3 minutes

The Indian banking industry has evolved majorly in the past few years owing to technological innovations. Public and privatized banks are allotting bigger budgets towards acquiring and building IT infrastructure and have leveraged IT across all banking operations. Banks constantly face the business challenge of meeting customers’ expectations and improvising...