Blog

November 2017

IcedID – a new sophisticated banking Trojan: a technical analysis by Quick Heal Security Labs

  • 2
    Shares
1 Comment

Estimated reading time: 4 minutes

IcedID is a new player in the banking Trojan family. It has a modular architecture and capable of stealing banking credentials of the user by performing a man-in-the-middle attack (MITM). IcedID sets up a local proxy and redirects all Internet traffic through it. Additionally, it can download and execute components...

Beware! 12.5 million emails hiding a ransomware have been let loose by Necurs botnet

  • 69
    Shares
0
Necurs Botnet

Estimated reading time: 2 minutes

If you weren’t careful with your incoming emails, then it’s time you should. Attackers have released 12.5 million emails hiding a ransomware called the Scarab malware. And Necurs botnet, the world’s largest email spam botnet, is being used in this attack. First, what is a botnet? A group of computers...

Imgur security breach: If you use Imgur, then change your password immediately!

  • 82
    Shares
19

Estimated reading time: 2 minutes

Popular image-sharing site Imgur has issued a notification through its official blog about a security breach that impacted 1.7 million users. This breach had occurred back in 2014. The company learned about this from security researcher Troy Hunt. What was compromised in the Imgur security breach? Data of 1.7 million Imgur...

Massive campaign delivering Monero Miner via compromised websites – an analysis by Quick Heal Security Labs

  • 4
    Shares
0

Estimated reading time: 4 minutes

Ransomware outbreaks have been on the rise for quite some time now but suddenly we are observing a change in this trend.  Seems like the rise observed in cryptocurrency valuations especially for Bitcoins is making attackers to go after cryptocurrency mining. Cryptocurrency miner malware have become hot attack vectors for...

5 things you must know about the Uber data breach if you are worried about it

  • 49
    Shares
0
Uber_data_breach

Estimated reading time: 3 minutes

For any business, suffering a data breach is bad. But, not informing its customers about the breach is downright worse. And Uber, a global transportation app company, has made itself into a glaring example of the above statement. Last Tuesday (21.11.2017), Uber Technologies revealed that hackers were able to compromise...

Mumbai businessman loses ₹5.8 lakh in a spear phishing scam

  • 30
    Shares
0

Estimated reading time: 2 minutes

This story has been sourced from Hindustan Times. On November 18, a businessman from Powai, Mumbai, received an email that looked like it was sent by a close friend. In the email, the friend informed that he is stuck somewhere and that he needed an urgent loan of ₹5.8 lakh...

9 things you must learn from the Quick Heal Quarterly Threat Report Q3 2017

0
Quick Heal Quarterly Threat Report

Estimated reading time: 2 minutes

The Quick Heal Quarterly Threat Report is a detailed analysis of cybersecurity threats that prevail during a particular quarter affecting the Windows and Android platform. Our Q3 (July – September) Threat Report is up and here are the 9 important things that we must know. #1. Quick Heal detected over...

Want to scam an online scammer? Here’s how you can do it with Re:scam

  • 72
    Shares
1 Comment
rescan_netsafe_email_bot_

Estimated reading time: 2 minutes

How many times have you received an email congratulating you about winning a lottery of $1 Million or that your bank account will be suspended unless you take an action like clicking on a link to update your bank details? I’d guess, at least once in your lifetime. And even...

Fake Apps – a new emerging trend!

  • 28
    Shares
1 Comment

Estimated reading time: 3 minutes

Recently we had blogged about a fake WhatsApp app on Google Play. And soon after we started observing more fake apps getting hosted on Google Play. Interestingly, these fake apps were having good ratings and download count which clearly suggest the growing trend of fake apps in the Android world....

5 common password mistakes and tips for creating stronger passwords

  • 87
    Shares
0
Common Password Mistakes

Estimated reading time: 3 minutes

While technology has leaped from earth to the extraterrestrial, we have not given up on our habit of taking passwords casually. In this post, we have outlined some of the most common password mistakes that people make and some really simple tips for creating better, stronger, and secure passwords. 5...