Blog

August 2017

  • 4
    Shares
0

Estimated reading time: 2 minutes

Quick Heal Security Labs has come across various email campaigns that are actively exploiting the famous vulnerability CVE-2017-0199 in their bid to target prominent private industries in India. CVE-2017-0199 was a zero-day vulnerability reported in April 2017 by two different security firms. Almost all of the MS Office versions were...
  • 375
    Shares
2

Estimated reading time: 4 minutes

The 5 things that you can do to recover money stolen from your bank account are based on an incident experienced by my mother. An amount of 50,000 was stolen from her bank account. The rest of the post narrates the incident. My mother (a homemaker) received a call on...
  • 415
    Shares
0

Estimated reading time: 4 minutes

If you are a parent and don’t know anything about the Blue Whale Challenge, then it’s important that you read the following post. What is the Blue Whale Challenge? The Blue Whale Challenge is supposedly an Internet game where players are assigned 50 different tasks by the game admin (also...
  • 2
    Shares
0

Estimated reading time: 3 minutes

As viruses, malware, and online threats evolve, we have to strengthen the security perimeter of our computer and other digital devices. The latest version of Quick Heal has been built and improved significantly so that it can protect users from all types of threats, even the most destructive ones such...
  • 3
    Shares
0

Estimated reading time: 1 minute

If you are using a smartphone and a laptop, then it is most likely for at least one of your family members using a similar device or devices. Your parents, for instance, might be using a Windows desktop, your sibling a Mac and your kids an Android smartphone. In short,...
  • 35
    Shares
0

Estimated reading time: 5 minutes

GlobeImposter Ransomware has been increasingly active and observed recently to be appending different suffixes to files it encrypt. A few patterns observed are using 3 random numbers such as “.492, .490, .725, .726, and .707”, random alphanumeric words such as “.p1crypt, .A1crypt, .BRT92, and .mtk118” and suffixes like “.OCEAN, .SEA,...
  • 56
    Shares
0

Estimated reading time: 4 minutes

The fileless malware is a malware family that does not leave any trace of its infection in the affected file system. Also known as the ‘memory resident virus’, this type of malware hides in the registry and memory making it difficult for traditional antivirus software to identify the infection. However,...
  • 30
    Shares
0

Estimated reading time: 2 minutes

TrickBot has been a busy malware in the last month because of its various polymorphic propagation methods and techniques. We have seen collective versions and the same medium of propagation – the spam emails. These emails contain attachments to download or a direct link to spread the malicious payload. Trickbot...
  • 19
    Shares
0

Estimated reading time: 4 minutes

Malspam email or malicious spam email is considered as one of the favorite malware delivery channels for attackers to deliver their malware to their targeted victims. Attackers also run spam email campaigns to distribute their malware to a large number of users. For attackers to succeed, two things are important...
  • 45
    Shares
0

Estimated reading time: 4 minutes

Quick Heal Security Labs has found 2 fraudulent apps pretending to be Adobe Flash Player on the Google Play Store. Presently, no official apps of Adobe Flash Player are available on the Play Store. The rest of the post will tell you more. Fake App #1. Plugin for Video Flash...